Image hashing with color vector angle

被引:31
作者
Tang, Zhenjun [1 ,2 ]
Li, Xuelong [3 ]
Zhang, Xianquan [1 ,2 ]
Zhang, Shichao [1 ,2 ]
Dai, Yumin [1 ,2 ]
机构
[1] Guangxi Normal Univ, Guangxi Key Lab Multisource Informat Min & Secur, Guilin 541004, Peoples R China
[2] Guangxi Normal Univ, Dept Comp Sci, Guilin 541004, Peoples R China
[3] Chinese Acad Sci, Xian Inst Opt & Precis Mech, Xian 710119, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Image hashing; Hashing function; Color vector angle; Color histogram; RING PARTITION; ROBUST; SECURE; WATERMARKING; DESCRIPTOR; SCHEME;
D O I
10.1016/j.neucom.2018.04.057
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Color vector angle (CVA) is an important feature of processing color images and has been successfully developed and used in real applications, such as edge detection, indexing and retrieval of images. However, it is unsolved how to apply the CVA to efficiently generating an image hash. Also, most image hashing algorithms choose luminance component of color image for hash generation and cannot well capture the color information of images. To tackle these issues, we study efficient image hashing algorithms with the histogram of CVAs, called HCVA hashing. The histogram is first extracted from those angles that are in the biggest circle inscribed inside the normalized image. And then, it is compressed to make a short hash. We conducted some experiments to assess the performance, and illustrated that the DCT (Discrete Cosine Transform) is the best one of that cooperating with HCVA at generating hashes, as well as the HCVA hashing is robust and promising. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:147 / 158
页数:12
相关论文
共 53 条
  • [1] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    [J]. SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [2] Supervised hashing with adaptive discrete optimization for multimedia retrieval
    Chen, Sixiu
    Shen, Fumin
    Yang, Yang
    Xu, Xing
    Song, Jingkuan
    [J]. NEUROCOMPUTING, 2017, 253 : 97 - 103
  • [3] Hashing Techniques: A Survey and Taxonomy
    Chi, Lianhua
    Zhu, Xingquan
    [J]. ACM COMPUTING SURVEYS, 2017, 50 (01)
  • [4] Perceptual image hashing using center-symmetric local binary patterns
    Davarzani, Reza
    Mozaffari, Saeed
    Yaghmaie, Khashayar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) : 4639 - 4667
  • [5] Robust video hashing based on radial projections of key frames
    De Roover, C
    De Vleeschouwer, C
    Lefèbvre, F
    Macq, B
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) : 4020 - 4037
  • [6] Dony R. D., 1999, Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.99TH8411), P687, DOI 10.1109/CCECE.1999.808005
  • [7] Perceptual hash-based feature description for person re-identification
    Fang, Wen
    Hu, Hai-Miao
    Hu, Zihao
    Liao, Shengcai
    Li, Bo
    [J]. NEUROCOMPUTING, 2018, 272 : 520 - 531
  • [8] An introduction to ROC analysis
    Fawcett, Tom
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (08) : 861 - 874
  • [9] Fridrich J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P178, DOI 10.1109/ITCC.2000.844203
  • [10] Feature Combination in Kernel Space for Distance Based Image Hashing
    Hassan, Ehtesham
    Chaudhury, Santanu
    Gopal, M.
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2012, 14 (04) : 1179 - 1195