Skip to main content
Log in

Binary multi-view perceptual hashing for image authentication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a novel Binary Multi-View Perceptual Hashing (BMVPH) scheme for image authentication, which provides compact and efficient representations and can easily scale to large data. We apply virtual prior attacks (e.g. additive noise, blurring, compression, logo-insert etc.) on original images to generate simulated distorted copies. The original images and the corresponding distorted copies provide the so-called training set. For perceptual hashing learning, we formulate BMVPH by two key components: collaborative binary representation learning (CBRL) and perpetual content authentication learning (PCAL), into a unified learning framework. Our BMVPH scheme collaboratively encodes the multi-view features into a compact common binary code space while considering the perceptual content similarity at the same time. The experimental results show that when compared with the state-of-the-art methods, the proposed algorithm can achieve higher discrimination and better perceptual robustness. In particular, the Area Under ROC Curve (AUC) increases on average of 3.8% as compared with other state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abbas SQ, Ahmed F, Zivic N, and Ur-Rehman O (2016) “Perceptual image hashing using svd based noise resistant local binary pattern,” in International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2016, pp. 401–407.

  2. Anitha K and Leveenbose P (2015) “Edge detection based salient region detection for accurate image forgery detection,” in IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–4

  3. Bondi L, Lameri S, Guera D, Bestagini P, Delp EJ, and Tubaro S (2017) “Tampering detection and localization through clustering of camera-based cnn features,” 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1855–1864

  4. Brbi M, Kopriva I (2018) Multi-view low-rank sparse subspace clustering. Pattern Recogn 73(2):247–258

    Google Scholar 

  5. Chen Y, Yu W, Feng J (2014) Robust image hashing using invariants of tchebichef moments. Optik - International Journal for Light and Electron Optics 125(19):5582–5587

    Google Scholar 

  6. Du L, Chen Z, Ke Y (2018) Image hashing for tamper detection with multi-view embedding and perceptual saliency. Advances in Multimedia 2018:1–11

    Google Scholar 

  7. Gao H, Nie F, Li X and Huang H (2015) “Multi-view Subspace Clustering,” in IEEE International Conference on Computer Vision, pp. 2380–7504

  8. Ghouti L (2014) “Robust perceptual color image hashing using quaternion singular value decomposition,” in IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3794–3798

  9. Hosny KM, Khedr YM, Khedr WI, and Mohamed ER (2018) “Robust image hashing using exact gaussian-hermite moments,” IET Image Processing, pp. 1–8

  10. Huang Z and Liu S (2018) “Robustness and discrimination oriented hashing combining texture and invariant vector distance,” in Proceedings of the 26th ACM International Conference on Multimedia, 2018, pp. 1389–1397

  11. Jgou H, Douze M, Schmid C (Jan. 2011) Product quantization for nearest neighbor search. IEEE Trans Pattern Anal Mach Intell 33(1):117–128

    Google Scholar 

  12. Jiang C, Pang Y (2018) Perceptual image hashing based on a deep convolution neural network for content authentication. Journal of Electronic Imaging 27(4):1–11

    Google Scholar 

  13. Kang LW, Lu CS, and Hsu CY (2010) “Compressive sensing-based image hashing,” in IEEE International Conference on Image Processing, pp. 1277–1280

  14. Khelifi F, Jiang J (2009) Analysis of the security of perceptual image hashing based on non-negative matrix factorization. IEEE Signal Processing Letters 17(1):43–46

    Google Scholar 

  15. Kim C (2003) Content-based image copy detection. Signal Process Image Commun 18(3):169–184

    Google Scholar 

  16. Kozat SS, Mihcak K, Venkatesan R (2004) “Robust perceptual image hashing via matrix invariances,” in IEEE Conf. on Image Processing, pp. 3443–3446

  17. Kulis B and Grauman K (2010) “Kernelized locality-sensitive hashing for scalable image search,” in in Proc. IEEE 12th Int. Conf. Computer Vision, pp. 2130–2137

  18. Lefebvre F, Czyz J, Macq B (2003) “A robust soft hash algorithm for digital image signature,” in in Proc. IEEE Int. Conf. Image Processing (ICIP), vol. 2, pp. 495–498

  19. Lei Y, Wang Y-G, Huang J (2011) Robust image hash in radon transform domain for authentication. 26:280–288

  20. Liu W, Wang J, Kumar S, and Chang SF (2011) “Hashing with graphs,” in in Proc. 28th Int. Conf. Machine Learning (ICML), pp. 1–8

  21. Liu W, Wang J, Ji R, Jiang YG, and Chang SF (2012) “Supervised hashing with kernels,” in in Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR), pp. 2074–2081.

  22. Liu H, Xiao D, Xiao Y, Zhang Y (2016) Robust image hashing with tampering recovery capability via low-rank and sparse representation. Multimed Tools Appl 75(13):7681–7696

    Google Scholar 

  23. Lv X, Wang ZJ (2009) An extended image hashing concept: content based fingerprinting using fjlt. EURASIP J Inf Security 2009(1):1–17

    Google Scholar 

  24. Lv X and Wang ZJ (2009) “An extended image hashing concept: Content-based fingerprinting using fjlt,” EURASIP J. Information Security, vol. 2009

  25. Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans. Inf. Forensics Security 7(3):1081–1093

    Google Scholar 

  26. Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Transactions on Information Forensics and Security 7:1081–1093

    Google Scholar 

  27. Lv X, Wang A (Nov. 2013) Compressed binary image hashes based on semisupervised spectral embedding. IEEE Trans Inf Forensics Security 8(11):1838–1849

    Google Scholar 

  28. Monga V and Evans B (2004) “Robust perceptual image hashing using feature points,” in 2004 International Conference on Image Processing, pp. 677–680

  29. Monga V, Evans B (2006) Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Process 15(11):3452–3465

    Google Scholar 

  30. Monga V, Mhcak M (Sep. 2007) Robust and secure image hashing via nonnegative matrix factorizations. IEEE Trans. Inf. Forensics Security 2(3):376–390

    Google Scholar 

  31. Monga V, Mihcak MK (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Transactions on Information Forensics and Security 2:376–390

    Google Scholar 

  32. Mu Y, Shen J, and Yan S (2010) “Weakly-supervised hashing in kernel space,” in in Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR), pp. 3344–3351.

  33. Nguyen DQ, Weng L, and Preneel B (2011) “Radon transform-based secure image hashing,” in Communications and Multimedia Security

  34. Ouyang J, Coatrieux G, Shu H (2015) Robust hashing for image authentication using quaternion discrete fourier transform and log-polar transform. Digital Signal Processing 41:98–109

    Google Scholar 

  35. Ouyang J, Wen X, Liu J, and Chen J (2016) “Robust hashing based on quaternion zernike moments for image authentication,” Acm Transactions on Multimedia Computing Communications and Applications, vol. 12, no. 4s, p. 63

  36. Pun CM, Yan CP, and Yuan X (2017) “Robust image hashing using progressive feature selection for tampering detection,” Multimedia Tools and Applications, vol. 77, pp. 11 609–11 633

  37. Qin C, Chang C-H, Tsou P-L (2013) Robust image hashing using non-uniform sampling in discrete fourier domain. Digital Signal Processing 23(2):578–585

    MathSciNet  Google Scholar 

  38. Qin C, Chen X, Dong J, Zhang X (2016) Perceptual image hashing with selective sampling for salient structure features. Displays 45:26–37

    Google Scholar 

  39. Qin C, Chen X, Luo X, Xinpeng Z, Sun X (2018) Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inf Sci 423:284–302

    MathSciNet  Google Scholar 

  40. Qin C, Sun M, Chang C-C (2018) Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process 142:194–205

    Google Scholar 

  41. C. Qin, Y. Hu, H. Yao, X. Duan, and L. Gao (2019) “Perceptual image hashing based on weber local binary pattern and color angle representation,” IEEE Access, vol. 7, pp. 45 460–45 471

  42. Salakhutdinov R, Hinton G (2009) Semantic hashing. Int J Approx Reason 50(7):969–978

    Google Scholar 

  43. Srivastava M, Siddiqui J, and Ali MA (2017) “Robust image hashing based on statistical features for copy detection,” in IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering, pp. 490–495

  44. Strecha MBC, Bronstein A (Jan. 2012) Ldahash: improved matching with smaller descriptors. IEEE Trans Pattern Anal Mach Intell 34(1):66–78

    Google Scholar 

  45. Sun R, Zeng W (2014) Secure and robust image hashing via compressive sensing. Multimed Tools Appl 70(3):1651–1665

    Google Scholar 

  46. Sun R, Yan X, and Ding Z (2011) “Robust image hashing using locally linear embedding,” in International Conference on Computer Science and Service System, pp. 715–718

  47. Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hashing. IEEE Trans. Inf. Forensics Security 1(2):215–230

    Google Scholar 

  48. Tagliasacchi M, Valenzise G, Tubaro S (2009) Hash-based identification of sparse image tampering. IEEE Trans Image Process 18(11):2491–2504

    MathSciNet  MATH  Google Scholar 

  49. Tang Z, Wang S, Zhang X, Wei W, Zhao Y (2011) Lexicographical framework for image hashing with implementation based on dct and nmf. Multimed Tools Appl 52(2–3):325–345

    Google Scholar 

  50. Tang Z, Huang L, Dai Y, Yang F (2012) Robust image hashing based on multiple histograms. International Journal of Digital Content Technology and its Applications 6(23):39–47

    Google Scholar 

  51. Tang Z, Zhang X, Huang L, Dai Y (2013) Robust image hashing using ring-based entropies. Signal Process 93(7):2061–2069

    Google Scholar 

  52. Tang Z, Yang F, Huang L, Zhang X (2014) Robust image hashing with dominant dct coefficients. Optik - International Journal for Light and Electron Optics 125(18):5102–5107

    Google Scholar 

  53. Tang Z, Dai Y, Zhang X, Huang L, Yang F (2014) Robust image hashing via colour vector angles and discrete wavelet transform. 8:142–149

  54. Tang Z, Ruan L, Qin C, Zhang X, Yu C (2015) Robust image hashing with embedding vector variance of lle. Digital Signal Processing 43(C):17–27

    Google Scholar 

  55. Tang Z, Zhang X, Li X, Zhang S (2016) Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forensics Security 11(1):200–214

    Google Scholar 

  56. Tang Z, Zhang X, Li X, Zhang S (2016) Robust image hashing with ring partition and invariant vector distance. IEEE Transactions on Information Forensics and Security 11:200–214

    Google Scholar 

  57. Tang Z, Huang L, Zhang X, Lao H (2016) Robust image hashing based on color vector angle and canny operator. AEUE - International Journal of Electronics and Communications 70(6):833–841

    Google Scholar 

  58. Tang C, Zhu X, Liu X, Li M, Wang P, Zhang C, Wang L (2019) Learning a joint affinity graph for multiview subspace clustering. IEEE Transactions on Multimedia 21(7):1724–1736

    Google Scholar 

  59. Venkatesan MHJR, Koon SM and Moulin P (2000) “Robust image hashing,” in IEEE Conf. on Image Processing, pp. 664–666

  60. Wang J, Kumar S, Chang S (Dec. 2012) Semi-supervised hashing for large-scale search. IEEE Trans Pattern Anal Mach Intell 34(12):2393–2406

    Google Scholar 

  61. Wang X, Xue J, Zheng Z, Liu Z, Li N (2012) Image forensic signature for content authenticity analysis. J Visual Communication and Image Representation 23:782–797

    Google Scholar 

  62. Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE Trans. Inf. Forensics Security 10(7):1336–1349

    Google Scholar 

  63. P. Wang, A. Jiang, Y. Cao, Y. Gao, R. Tan, H. He, and M. Zhou (2018) “Robust image hashing based on hybrid approach of scale-invariant feature transform and local binary patterns,” in 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 11, pp. 1–5

  64. Weiss Y, Torralba A, and Fergus R (2008) “Spectral hashing,” in in Proc. Advances in Nerual Information Processing Systems, pp. 1753–1760.

  65. Yan C-P, Pun C-M (2017) Multi-scale difference map fusion for tamper localization using binary ranking hashing. IEEE Transactions on Information Forensics and Security 12:2144–2158

    Google Scholar 

  66. C.-P. Yan, C.-M. Pun, and X.-C. Yuan (2015) “Adaptive local feature based multi-scale image hashing for robust tampering detection,” TENCON 2015–2015 IEEE Region 10 Conference, pp. 1–4

  67. Yan C, Pun C, Yuan X (2016) Quaternion-based image hashing for adaptive tampering localization. IEEE Trans. Inf. Forensics Security 11(12):2664–2677

    Google Scholar 

  68. Yan C-P, Pun C-M, Yuan X (2016) Quaternion-based image hashing for adaptive tampering localization. IEEE Transactions on Information Forensics and Security 11:2664–2677

    Google Scholar 

  69. Yan CP, Pun CM, Yuan XC (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Process 121:1–16

    Google Scholar 

  70. Yang L, Chen Q, Tian J, Wu D (2011) Content based image hashing using companding and gray code. Security and Communication Networks 4(12):1378–1386

    Google Scholar 

  71. Yarlagadda SK, Güera D, Bestagini P, Zhu FM, Tubaro S, and Delp EJ (2018) “Satellite image forgery detection and localization using gan and one-class classifier,” CoRR, vol. abs/1802.04881

  72. Zhan K, Zhang C, Guan J, Wang J (2018) Graph learning for multiview clustering. IEEE Transactions on Cybernetics 48(10):2887–2895

    Google Scholar 

  73. Zhan K, Nie F, Wang J, Yang Y (2019) Multiview consensus graph clustering. IEEE Trans Image Process 28(3):1261–1270

    MathSciNet  Google Scholar 

  74. Zhan K, Niu C, Chen C, Nie F, Zhang C, Yang Y (2019) Graph structure fusion for multiview clustering. IEEE Trans Knowl Data Eng 31(10):1984–1993

    Google Scholar 

  75. D. Zhang, J. Chen, and B. Shao (2015) “Perceptual image hashing based on zernike moment and entropy,” Electronic Science and Technology

  76. Zhang C, Hu Q, Fu H, Zhu P, Cao X (2017) “Latent Multi-view Subspace Clustering,” in IEEE Conference on Computer Vision and Pattern Recognition, pp. 1063–6919

  77. Zhang Z, Liu L, Shen F, Shen HT, and Shao L (2018) “Binary multi-view clustering,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PP, no. 99, pp. 1–1

  78. Zhang C, Fu H, Hu Q, Cao X, Xie Y, Tao D and Xu D, “Generalized Latent Multi-View Subspace Clustering,” IEEE Trans. Pattern Analysis and Machine Intelligencel, to be published

  79. Zhao Y and Wei W (2010) “Perceptual image hash for tampering detection using zernike moments,” in IEEE International Conference on Progress in Informatics and Computing, pp. 738–742.

  80. Zhao Y, Wang S, Zhang X, Yao H (2013) Robust hashing for image authentication using zernike moments and local features. IEEE Transactions on Information Forensics and Security 8(1):55–63

    Google Scholar 

  81. Zhaoqing L, Qiong L, Jingrui L, Xiyuan P (2011) Sift based image hashing algorithm. Chinese Journal of Scientific Instrument 32(9):2024–2028

    Google Scholar 

Download references

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant No. 61602344), Science&Technology Development Fund of Tianjin Education Commission for Higher Education, China (Grant No. 2017KJ091) and Natural Science Foundation of Tianjin (Grant No. 17JCQNJC00600).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ling Du.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Du, L., Chen, Z. & Ho, A.T.S. Binary multi-view perceptual hashing for image authentication. Multimed Tools Appl 80, 22927–22949 (2021). https://doi.org/10.1007/s11042-020-08736-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08736-6

Keywords

Navigation