Image hashing with color vector angle

被引:31
作者
Tang, Zhenjun [1 ,2 ]
Li, Xuelong [3 ]
Zhang, Xianquan [1 ,2 ]
Zhang, Shichao [1 ,2 ]
Dai, Yumin [1 ,2 ]
机构
[1] Guangxi Normal Univ, Guangxi Key Lab Multisource Informat Min & Secur, Guilin 541004, Peoples R China
[2] Guangxi Normal Univ, Dept Comp Sci, Guilin 541004, Peoples R China
[3] Chinese Acad Sci, Xian Inst Opt & Precis Mech, Xian 710119, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Image hashing; Hashing function; Color vector angle; Color histogram; RING PARTITION; ROBUST; SECURE; WATERMARKING; DESCRIPTOR; SCHEME;
D O I
10.1016/j.neucom.2018.04.057
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Color vector angle (CVA) is an important feature of processing color images and has been successfully developed and used in real applications, such as edge detection, indexing and retrieval of images. However, it is unsolved how to apply the CVA to efficiently generating an image hash. Also, most image hashing algorithms choose luminance component of color image for hash generation and cannot well capture the color information of images. To tackle these issues, we study efficient image hashing algorithms with the histogram of CVAs, called HCVA hashing. The histogram is first extracted from those angles that are in the biggest circle inscribed inside the normalized image. And then, it is compressed to make a short hash. We conducted some experiments to assess the performance, and illustrated that the DCT (Discrete Cosine Transform) is the best one of that cooperating with HCVA at generating hashes, as well as the HCVA hashing is robust and promising. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:147 / 158
页数:12
相关论文
共 53 条
  • [41] Robust hash generation technique for content-based image authentication using histogram
    Vadlamudi, Lokanadham Naidu
    Vaddella, Rama Prasad V.
    Devara, Vasumathi
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (11) : 6585 - 6604
  • [42] Venkatesan R, 2000, 2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, P664, DOI 10.1109/ICIP.2000.899541
  • [43] A novel image hash algorithm resistant to print-scan
    Wu, Di
    Zhou, Xuebing
    Niu, Xiamu
    [J]. SIGNAL PROCESSING, 2009, 89 (12) : 2415 - 2424
  • [44] Compact Structure Hashing via Sparse and Similarity Preserving Embedding
    Ye, Renzhen
    Li, Xuelong
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (03) : 718 - 729
  • [45] Facial expression recognition via learning deep sparse autoencoders
    Zeng, Nianyin
    Zhang, Hong
    Song, Baoye
    Liu, Weibo
    Li, Yurong
    Dobaie, Abdullah M.
    [J]. NEUROCOMPUTING, 2018, 273 : 643 - 649
  • [46] Denoising and deblurring gold immunochromatographic strip images via gradient projection algorithms
    Zeng, Nianyin
    Zhang, Hong
    Li, Yurong
    Liang, Jinling
    Dobaie, Abdullah M.
    [J]. NEUROCOMPUTING, 2017, 247 : 165 - 172
  • [47] Spatial pyramid deep hashing for large-scale image retrieval
    Zhao, Wanqing
    Luo, Hangzai
    Peng, Jinye
    Fan, Jianping
    [J]. NEUROCOMPUTING, 2017, 243 : 166 - 173
  • [48] Scalable Linear Visual Feature Learning via Online Parallel Nonnegative Matrix Factorization
    Zhao, Xueyi
    Li, Xi
    Zhang, Zhongfei
    Shen, Chunhua
    Zhuang, Yueting
    Gao, Lixin
    Li, Xuelong
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2016, 27 (12) : 2628 - 2642
  • [49] Robust Hashing for Image Authentication Using Zernike Moments and Local Features
    Zhao, Yan
    Wang, Shuozhong
    Zhang, Xinpeng
    Yao, Heng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 55 - 63
  • [50] Spectral Multimodal Hashing and Its Application to Multimedia Retrieval
    Zhen, Yi
    Gao, Yue
    Yeung, Dit-Yan
    Zha, Hongyuan
    Li, Xuelong
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (01) : 27 - 38