Robust image hashing via colour vector angles and discrete wavelet transform

被引:55
作者
Tang, Zhenjun [1 ]
Dai, Yumin [1 ]
Zhang, Xianquan [1 ]
Huang, Liyan [1 ]
Yang, Fan [1 ]
机构
[1] Guangxi Normal Univ, Dept Comp Sci, Guilin 541004, Peoples R China
关键词
SECURE; DESCRIPTOR; SCHEME;
D O I
10.1049/iet-ipr.2013.0332
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Colour vector angle has been widely used in edge detection and image retrieval, but its investigation in image hashing is still limited. In this study, the authors investigate the use of colour vector angle in image hashing and propose a robust hashing algorithm combining colour vector angles with discrete wavelet transform (DWT). Specifically, the input image is firstly resized to a normalised size by bi-cubic interpolation and blurred by a Gaussian low-pass filter. Colour vector angles are then calculated and divided into non-overlapping blocks. Next, block means of colour vector angles are extracted to form a feature matrix, which is further compressed by DWT. Image hash is finally formed by those DWT coefficients in the LL sub-band. Experiments show that the proposed hashing is robust against normal digital operations, such as JPEG compression, watermarking embedding and rotation within 5 degrees. Receiver operating characteristics curve comparisons are conducted and the results show that the proposed hashing is better than some well-known algorithms.
引用
收藏
页码:142 / 149
页数:8
相关论文
共 21 条
[1]   A secure and robust hash-based scheme for image authentication [J].
Ahmed, Fawad ;
Siyal, M. Y. ;
Abbas, Vali Uddin .
SIGNAL PROCESSING, 2010, 90 (05) :1456-1470
[2]   Robust audio hashing based on discrete-wavelet-transform and non-negative matrix factorisation [J].
Chen, N. ;
Wan, W. ;
Xiao, H. -D. .
IET COMMUNICATIONS, 2010, 4 (14) :1722-1731
[3]   Robust video hashing based on radial projections of key frames [J].
De Roover, C ;
De Vleeschouwer, C ;
Lefèbvre, F ;
Macq, B .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :4020-4037
[4]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[5]   Perceptual Image Hashing Based on Virtual Watermark Detection [J].
Khelifi, Fouad ;
Jiang, Jianmin .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2010, 19 (04) :981-994
[6]  
Kim NW, 2005, LECT NOTES COMPUT SC, V3568, P454
[7]   Spatial color descriptor for image retrieval and video segmentation [J].
Lee, HY ;
Lee, HK ;
Ha, YH .
IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (03) :358-367
[8]   Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization [J].
Li, Yuenan ;
Lu, Zheming ;
Zhu, Ce ;
Niu, Xiamu .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (04) :1963-1980
[9]   A robust image authentication method distinguishing JPEG compression from malicious manipulation [J].
Lin, CY ;
Chang, SF .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) :153-168
[10]   Wave atom transform generated strong image hashing scheme [J].
Liu, Fang ;
Cheng, Lee-Ming ;
Leung, Hon-Yin ;
Fu, Qi-Kai .
OPTICS COMMUNICATIONS, 2012, 285 (24) :5008-5018