Robust Image Hashing with Tensor Decomposition

被引:105
作者
Tang, Zhenjun [1 ]
Chen, Lv [1 ]
Zhang, Xianquan [1 ]
Zhang, Shichao [1 ]
机构
[1] Guangxi Normal Univ, Dept Comp Sci, Guangxi Key Lab Multisource Informat Min & Secur, Guilin 541004, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Image hashing; tensor construction; tensor decomposition; Tucker decomposition; RING PARTITION; SCHEME; WATERMARKING; SECURE;
D O I
10.1109/TKDE.2018.2837745
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a new image hashing that is designed with tensor decomposition (TD), referred to as TD hashing, where image hash generation is viewed as deriving a compact representation from a tensor. Specifically, a stable three-order tensor is first constructed from the normalized image, so as to enhance the robustness of our TD hashing. A popular TD algorithm, called Tucker decomposition, is then exploited to decompose the three-order tensor into a core tensor and three orthogonal factor matrices. As the factor matrices can reflect intrinsic structure of original tensor, hash construction with the factor matrices makes a desirable discrimination of the TD hashing. To examine these claims, there are 14,551 images selected for our experiments. A receiver operating characteristics (ROC) graph is used to conduct theoretical analysis and the ROC comparisons illustrate that the TD hashing outperforms some state-of-the-art algorithms in classification performance between the robustness and discrimination.
引用
收藏
页码:549 / 560
页数:12
相关论文
共 69 条
[1]   A secure and robust hash-based scheme for image authentication [J].
Ahmed, Fawad ;
Siyal, M. Y. ;
Abbas, Vali Uddin .
SIGNAL PROCESSING, 2010, 90 (05) :1456-1470
[2]  
[Anonymous], 2019, IEEE Std 754-2019 (Revision of IEEE 754-2008), P1, DOI [DOI 10.1109/IEEESTD.2008.4610935, 10.1109/IEEESTD.2017.8091139, 10.1109/IEEESTD.2019.8766229, DOI 10.1109/IEEESTD.2019.8766229]
[3]  
[Anonymous], 2007, DIGITAL IMAGE PROCES
[4]  
Burger W., 2009, PRINCIPLES DIGITAL I
[5]   Robust Face Clustering Via Tensor Decomposition [J].
Cao, Xiaochun ;
Wei, Xingxing ;
Han, Yahong ;
Lin, Dongdai .
IEEE TRANSACTIONS ON CYBERNETICS, 2015, 45 (11) :2546-2557
[6]  
Cheng C, 2012, IEEE IMAGE PROC, P1489, DOI 10.1109/ICIP.2012.6467153
[7]   Image hash generation method using hierarchical histogram [J].
Choi, Yong Soo ;
Park, Jong Hyuk .
MULTIMEDIA TOOLS AND APPLICATIONS, 2012, 61 (01) :181-194
[8]   Perceptual image hashing using center-symmetric local binary patterns [J].
Davarzani, Reza ;
Mozaffari, Saeed ;
Yaghmaie, Khashayar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) :4639-4667
[9]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[10]  
Franzen R., Kodak Lossless True Color Image Suite