Robust image authentication via locality sensitive hashing with core alignment

被引:0
作者
Qiang Ma
Lei Xu
Ling Xing
Bin Wu
机构
[1] Southwest University of Science and Technology,School of Information Engineering
[2] China Academy of Engineering Physics,Institute of Electronic Engineering
[3] Tsinghua University,Department of Computer Science and Technology
来源
Multimedia Tools and Applications | 2018年 / 77卷
关键词
Image hashing; Image robust authentication; Core alignment; Locality sensitive hashing; Hashing function optimization;
D O I
暂无
中图分类号
学科分类号
摘要
Robust image hashing is a promising technique to represent image’s perceptual content. However, when it comes to image authentication, tradeoff between robustness and discrimination is a non-negligible issue. The allowed content preserving operations and sensitive malicious manipulations on images are quite subjective to human’s perception. So it needs tactics to design good hashing methods. In this paper we incorporate the novel concept of core alignment into hashing, where the proposed core alignment improves the performances of balance. First, we formulize the hashing as a supervised minimal optimization problem based on Locality Sensitive Hashing, in which p-stable distribution is exploited to maintain high dimensional locality features. Then we solve this problem by two sub-optimization problems, i.e., searching for optimal shift and searching for optimal quantization intervals. By using particle swarm optimization and simulated annealing programming approaches we develop two stochastic solutions to those two problems, respectively. Experimental results show that our proposed hashing optimizations can find optimal solutions with limited steps, and the hashing method is superior to other state-of-the-art methods in terms of authentication and robustness.
引用
收藏
页码:7131 / 7152
页数:21
相关论文
共 75 条
  • [1] Bai X(2014)Data-dependent hashing based on p-stable distribution IEEE Trans Image Process 23 5033-5046
  • [2] Yang H(2000)Moment patterns in the Radon space, opt Eng 39 1088-1097
  • [3] Zhou J(2011)Robust image hash in Radon transform domain for authentication Signal Process Image Commun 26 280-288
  • [4] Ren P(2013)Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching Forensic Sci Int 224 59-67
  • [5] Cheng J(1963)Robust image hashing based on random Gabor filtering and dithered lattice vector quantization IEEE Trans Image Process 21 2012-646
  • [6] Galigekere RR(2012)A Self-Learning Particle Swarm Optimizer for Global Optimization Problems IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42 627-467
  • [7] Holdsworth DW(2007)Unicity distance of robust image hashing IEEE transactions on information forensics and security 2 462-3466
  • [8] Swamy MNS(2006)Perceptual image hashing via feature points: performance evaluation and tradeoffs IEEE Trans Image Process 15 3453-390
  • [9] Fenster A(2007)Robust and secure image hashing via non-negtive factorizations IEEE transactions on information forensics and security 2 376-79
  • [10] Lei Y(2006)A clustering based approach to perceptual image hashing IEEE transactions on information forensics and security 1 68-2400