Image hash generation method using hierarchical histogram

被引:0
作者
Yong Soo Choi
Jong Hyuk Park
机构
[1] Korea University,Graduate School of Information Security & Management
[2] SeoulTech,Department of Computer Science and Engineering
来源
Multimedia Tools and Applications | 2012年 / 61卷
关键词
Image hash; Hierarchical hash generation; Robustness; Statistical hypothesis testing;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, web applications, such as Stock Image and Image Library, are developed to provide the integrated management for user's images. Image hashing techniques are used for the image registration, management and retrieval as the identifier also, investigations have been performed to raise the hash performance like discernment. This paper proposes GLOCAL image hashing method utilizing the hierarchical histogram which is based on histogram bin population method. So far, many studies have proven that image hashing techniques based on this histogram are robust against image processing and geometrical attacks. We modified existing image hashing method developed by our research team [20]. The main idea of the paper is that it helps generate more fluent hash string if we have specific length of histogram bin. Another operation is empowering weighting factor into hash string at each level. Thus, we can raise the magnitude of hash string generated from same context or features and also strengthen the robustness of generated hash.
引用
收藏
页码:181 / 194
页数:13
相关论文
共 18 条
[1]  
Belongie S(2002)Shape matching and object recognition using shape contexts IEEE Trans Pattern Anal Mach Intell 24 509-522
[2]  
Malik J(2010)Robust 3D hashing algorithm using key-dependent block surface coefficient Journal of IEEK 47 1-14
[3]  
Puzicha J(2001)A robust image authentication system distinguishing JPEG compression from malicious manipulation IEEE Trans Circuits Syst Video Technol 11 153-168
[4]  
Lee SH(2004)Distinctive image features from scale-invariant key-points Int J Comput Vision 60 91-110
[5]  
Kwon KR(2005)Robust and secure image hashing via non-negative matrix factorizations IEEE Trans Inf Forensics Secur 27 379-391
[6]  
Lin CY(2006)Robust and secure image hashing IEEE Trans Inf Forensics Secur 1 215-230
[7]  
Chang SF(2008)Robust image hashing for tamper detection using non-negative matrix factorization JUCT 2 18-26
[8]  
Lowe DG(undefined)undefined undefined undefined undefined-undefined
[9]  
Monga V(undefined)undefined undefined undefined undefined-undefined
[10]  
Mhcak MK(undefined)undefined undefined undefined undefined-undefined