Perceptual Image Hashing Based on Virtual Watermark Detection

被引:66
作者
Khelifi, Fouad [1 ]
Jiang, Jianmin [1 ]
机构
[1] Univ Bradford, Sch Comp Informat & Media, Digital Media & Syst Res Inst, Bradford BD7 1DP, W Yorkshire, England
关键词
Image hashing; robustness; security; virtual watermark detection; OPTIMUM DETECTION; ROBUST; SECURITY; DESIGN;
D O I
10.1109/TIP.2009.2038637
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a new robust and secure perceptual image hashing technique based on virtual watermark detection. The idea is justified by the fact that the watermark detector responds similarly to perceptually close images using a non embedded watermark. The hash values are extracted in binary form with a perfect control over the probability distribution of the hash bits. Moreover, a key is used to generate pseudo-random noise whose real values contribute to the randomness of the feature vector with a significantly increased uncertainty of the adversary, measured by mutual information, in comparison with linear correlation. Experimentally, the proposed technique has been shown to outperform related state-of-the art techniques recently proposed in the literature in terms of robustness with respect to image processing manipulations and geometric attacks.
引用
收藏
页码:981 / 994
页数:14
相关论文
共 41 条
[1]  
A v d Lubbe J.C., 1997, Information theory
[2]  
[Anonymous], 2003, Techniques and Applications of Digital Watermarking and Content Protection
[3]  
[Anonymous], Probability, Random Variables and Stochastic Processes
[4]  
[Anonymous], DETECTION THEORY PSY
[5]  
[Anonymous], 1967, Mathematical Statistics: A Decision Theoretic Approach
[6]   A new decoder for the optimum recovery of nonadditive watermarks [J].
Barni, M ;
Bartolini, F ;
De Rosa, A ;
Piva, A .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (05) :755-766
[7]  
Barni M., 2004, Watermarking Systems Engineering: Enabling Digital AssetsSecurity and other Applications
[8]   Design and statistical analysis of a hash-aided image watermarking system [J].
Cannons, J ;
Moulin, P .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (10) :1393-1408
[9]   Watermarking security: Theory and practice [J].
Cayre, F ;
Fontaine, C ;
Furon, T .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :3976-3987
[10]   Robust optimum detection of transform domain multiplicative watermarks [J].
Cheng, Q ;
Huang, TS .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (04) :906-924