Learning to Hash for Personalized Image Authentication

被引:19
作者
Su, Zhiyong [1 ]
Yao, Liang [1 ]
Mei, Jialin [1 ]
Zhou, Lang [2 ]
Li, Weiqing [3 ]
机构
[1] Nanjing Univ Sci & Technol, Visual Comp Grp, Sch Automat, Nanjing 210094, Peoples R China
[2] Nanjing Univ Finance & Econ, Coll Informat Engn, Nanjing 210023, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Quantization (signal); Feature extraction; Measurement; Training; Task analysis; Binary codes; Metric learning; supervised quantization; image authentication; image hashing; LMNN; MARGIN NEAREST-NEIGHBOR;
D O I
10.1109/TCSVT.2020.3002146
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper takes a fresh look at the image authentication problem and proposes an alternative framework for personalized authentication based on the hash learning technology. Conventional image authentication methods tend to provide a general authentication framework for all images with the fixed quantization strategy and fixed control parameters determined based on given limited images and attacks. However, they may suffer from more or less misjudgments in practice, not to mention performance degradation when encountering out-of-sample images. Instead of proposing a new feature extraction algorithm, a novel personalized authentication framework which incorporates the distance metric learning technology and supervised quantization strategy to the process of image authentication is proposed in this paper. The tamper detection task is reformulated as a new supervised manipulation classification problem. For each input image, various content-preserving and content-changing samples are generated automatically firstly. Then, feature representations of all samples can be obtained by existing feature extraction methods. After that, a weighted large margin for manipulation classification (WLMMC) scheme is proposed to learn an effective feature mapping space to improve the classification performance between content-changing samples and content-preserving samples. During the quantization stage, a novel supervised personalized quantization strategy (SPQ), which is motivated by the observation that different attacks have different degrees of influence on feature components, is proposed to learn more compact yet discriminative binary codes for each input image. Effectiveness of the proposed framework is qualitatively and quantitatively demonstrated on a variety of images. Extensive experiments show that the proposed framework can significantly improve the authentication performance over the state-of-the-art techniques while achieve more compact hash codes flexibly as required.
引用
收藏
页码:1648 / 1660
页数:13
相关论文
共 33 条
  • [1] [Anonymous], 2016, IJCAI
  • [2] Bellet A, 2013, ARXIV
  • [3] Accelerated Manhattan hashing via bit-remapping with location information
    Chen, Wenshuo
    Ding, Guiguang
    Lin, Zijia
    Pei, Jisheng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 2441 - 2466
  • [4] Hashing Techniques: A Survey and Taxonomy
    Chi, Lianhua
    Zhu, Xingquan
    [J]. ACM COMPUTING SURVEYS, 2017, 50 (01)
  • [5] Unsupervised Semantic-Preserving Adversarial Hashing for Image Search
    Deng, Cheng
    Yang, Erkun
    Liu, Tongliang
    Li, Jie
    Liu, Wei
    Tao, Dacheng
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2019, 28 (08) : 4032 - 4044
  • [6] Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
  • [7] Content-based image authentication: current status, issues, and challenges
    Han, Shui-Hua
    Chu, Chao-Hsien
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (01) : 19 - 32
  • [8] Methods for image authentication: a survey
    Haouzia, Adil
    Noumeir, Rita
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2008, 39 (01) : 1 - 46
  • [9] Large Margin Nearest Neighbor Classification With Privileged Information for Biometric Applications
    He, Jingwen
    Xu, Dong
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (12) : 4567 - 4577
  • [10] Distance Metric Learning for Content Identification
    Jang, Dalwon
    Yoo, Chang D.
    Kalker, Ton
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) : 932 - 944