Perceptual Image Hashing Based on Virtual Watermark Detection

被引:66
作者
Khelifi, Fouad [1 ]
Jiang, Jianmin [1 ]
机构
[1] Univ Bradford, Sch Comp Informat & Media, Digital Media & Syst Res Inst, Bradford BD7 1DP, W Yorkshire, England
关键词
Image hashing; robustness; security; virtual watermark detection; OPTIMUM DETECTION; ROBUST; SECURITY; DESIGN;
D O I
10.1109/TIP.2009.2038637
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a new robust and secure perceptual image hashing technique based on virtual watermark detection. The idea is justified by the fact that the watermark detector responds similarly to perceptually close images using a non embedded watermark. The hash values are extracted in binary form with a perfect control over the probability distribution of the hash bits. Moreover, a key is used to generate pseudo-random noise whose real values contribute to the randomness of the feature vector with a significantly increased uncertainty of the adversary, measured by mutual information, in comparison with linear correlation. Experimentally, the proposed technique has been shown to outperform related state-of-the art techniques recently proposed in the literature in terms of robustness with respect to image processing manipulations and geometric attacks.
引用
收藏
页码:981 / 994
页数:14
相关论文
共 41 条
[21]   Analysis of the Security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization [J].
Khelifi, Fouad ;
Jiang, Jianmin .
IEEE SIGNAL PROCESSING LETTERS, 2010, 17 (01) :43-46
[22]   Robust perceptual image hashing via matrix invariants [J].
Kozat, SS ;
Venkatesan, R ;
Mihçak, MK .
ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, :3443-3446
[23]   Analysis of the hash function design strategy called SMASH [J].
Lamberger, Mario ;
Pramstaller, Norbert ;
Rechberger, Christian ;
Rijmen, Vincent .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (08) :3647-3655
[24]  
Lee DD, 2001, ADV NEUR IN, V13, P556
[25]  
Lin C. Y., 1998, P SPIE STORAGE RETRI, V3312
[26]   Rotation, scale, and translation resilient watermarking for images [J].
Lin, CY ;
Wu, M ;
Bloom, JA ;
Cox, IJ ;
Miller, ML ;
Lui, YM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (05) :767-782
[27]   Unicity distance of robust image hashing [J].
Mao, Yinian ;
Wu, Min .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (03) :462-467
[28]  
MONGA V, 2005, IEEE INT C MULT EXP
[29]  
MONGA V, 2006, IEEE INT C AC SPEECH
[30]  
Monga V., 2004, IEEE INT C IM PROC S