Skip to main content

Histogram-Based Image Hashing for Searching Content-Preserving Copies

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 6730))

Abstract

Image hashing as a compact abstract can be used for content search. Towards this end, a desired image hashing function should be resistant to those content-preserving manipulations (including additive-noise like processing and geometric deformation operations). Most countermeasures proposed in the literature usually focus on the problem of additive noises and global affine transform operations, but few are resistant to recently reported random bending attacks (RBAs). In this paper, we address an efficient and effective image hashing algorithm by using the resistance of two statistical features (image histogram in shape and mean value) for those challenging geometric deformations. Since the features are extracted from Gaussian-filtered images, the hash is also robust to common additive noise-like operations (e.g., lossy compression, low-pass filtering). The hash uniqueness is satisfactory for different sources of images. With a large number of real-world images, we construct a hash-based image search system to show that the hash function can be used for searching content-preserving copies from the same source.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mihçak, M.K., Koval, O., Voloshynovskiy, S.: EURASIP 2007, Special Issue: Robust perceptual hashing of multimedia content (2007)

    Google Scholar 

  2. Venkatesan, R., Jakubowski, M.H.: Image hashing. In: DIMACS Conf. on Intellectual Property Protection, Piscataway, USA, NJ (April 2000)

    Google Scholar 

  3. Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proc. IEEE Int. Conf. Image Processing, Vancouver, BC, Canada, pp. 664–666 (September 2000)

    Google Scholar 

  4. Jing, F., Li, M., Zhang, H.-J., Zhang, B.: An efficient and effective region-based image retrieval framework. IEEE Trans. Image Processing 13(5), 699–709 (2004)

    Article  Google Scholar 

  5. Mihçak, M.K., Venkatesan, R.: A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 51–65. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Özer, H., Sankur, B., Memon, N., Anarim, E.: Perceptual audio hashing functions. EURASIP Journal on Applied Signal Processing 12, 1780–1793 (2005)

    Article  Google Scholar 

  7. Dittmann, J., Steinmetz, A., Steinmetz, R.: Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proc. IEEE Int. Conf. Multimedia Computing and Systems, Florence, Italy, pp. 209–213 (June 1999)

    Google Scholar 

  8. Coskun, B., Sankur, B., Memon, N.: Spatio-temporal transform based video hashing. IEEE Transactions on Multimedia 8(6), 1190–1208 (2006)

    Article  Google Scholar 

  9. Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proc. IEEE Int. Conf. Information Technology: Coding Computing, pp. 178–183 (March 2000)

    Google Scholar 

  10. Mihçak, M.K., Venkatesan, R.: Video watermarking using image hashing, Microsoft Research Tech. Rep. (2001)

    Google Scholar 

  11. Mihçak, M.K., Venkatesan, R.: New iterative geometric methods for robust perceptual image hashing. In: Proc. ACM Workshop Security and Privacy in Digital Rights Management, Philadelphia, PA, pp. 13–21 (November 2001)

    Google Scholar 

  12. Swaminathan, A., Mao, Y., Wu, M.: Image hashing resilient to geometric and filtering operations. In: Proc. IEEE Workshop on Multimedia Signal Processing, Siena, Italy (September 2004)

    Google Scholar 

  13. Lu, C.S., Hsu, C.Y.: Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multimedia System 11(2), 159–173 (2005)

    Article  Google Scholar 

  14. Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1(2), 215–230 (2006)

    Article  Google Scholar 

  15. Monga, V., Mihçak, M.K.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Transactions on Information Forensics and Security 2(3), 376–390 (2007)

    Article  Google Scholar 

  16. Licks, V., Jordan, R.: Geometric attacks on image watermarking systems. IEEE Multimedia 12(3), 68–78 (2005)

    Article  Google Scholar 

  17. Barni, M., D’Angelo, A., Merhav, N.: Expanding the class of watermark de-synchronization attacks. In: Proc. 9th ACM Multimedia and Security Workshop, Dallas, Texas, USA, pp. 195–204 (September 2007)

    Google Scholar 

  18. Voloshynovskiy, S., Deguillaume, F., Pun, T.: Multibit digital watermarking robust against local nonlinear geometrical distortions. In: Proc. IEEE Int. Conf. Image Processing, Thessaloniki, Greece, pp. 999–1002 (2001)

    Google Scholar 

  19. Xiang, S., Kim, H.J., Huang, J.: Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Trans. Circuits and Systems for Video Technology 18(6), 777–790 (2008)

    Article  Google Scholar 

  20. Xiang, S., Kim, H.J., Huang, J.: Histogram-based image hashing scheme robust against geometric deformations. In: Proc. 9th ACM Multimedia and Security Workshop, Dallas, Texas, USA, pp. 121–128 (September 2007)

    Google Scholar 

  21. Schneider, M., Chang, S.-F.: A robust content based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, vol. 3, pp. 227–230 (September 1996)

    Google Scholar 

  22. Ferman, A.M., Tekalp, A.M., Mehrotra, R.: Robust color histogram descriptors for video segment retrieval and identification. IEEE Trans. Image Processing 11(5), 497–508 (2002)

    Article  Google Scholar 

  23. Hamon, K., Schmucker, M., Zhou, X.: Histogram-based perceptual hashing for minimally changing video sequences. In: Proc. 2nd Int. Conf. Automated Production of Cross Media Content for Multi-Channel Distribution, Leeds, UK, pp. 236–241 (2006)

    Google Scholar 

  24. Stark, J.A.: Adaptive image contrast enhancement using generalizations of histogram equalization. IEEE Trans. Image Processing 9(5), 889–896 (2000)

    Article  Google Scholar 

  25. Olmos, A., Kingdom, F.A.A.: McGill Calibrated Colour Image Database (2004), http://tabby.vision.mcgill.ca

  26. http://decsai.ugr.es/cvg/CG/base.htm

  27. http://www.stat.psu.edu/~jiali/index.download.html

  28. http://www.imageafter.com/

  29. Radhakrishnan, R., Xiong, Z.Y., Memon, N.: On the security of the visual hash function. Journal of Electronic Imaging 14(1), 013011 (2005)

    Article  Google Scholar 

  30. Mao, Y., Wu, M.: Unicity distance of robust image hashing. IEEE Transactions on Information Forensics and Security 2(3), 462–467 (2007)

    Article  Google Scholar 

  31. Wu, M., Mao, Y., Swaminathan, A.: A signal processing and randomization perspective of robust and secure image hashing. In: Proc. IEEE Workshop on Statistical Signal Processing, Madison, WI, pp. 166–170 (August 2007)

    Google Scholar 

  32. Roy, S., Sun, Q.: Robust hash for detecting and localizing image tampering. In: Proc. IEEE Int. Conf. Image Processing, San Antonio, Texas, USA, vol. 6, pp. 117–120 (2007)

    Google Scholar 

  33. Weng, L., Preneel, B.t.: Attacking some perceptual image hash algorithms. In: Proc. IEEE Int. Conf. Multimedia and Expo., Beijing, China, pp. 879–882 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xiang, S., Kim, H.J. (2011). Histogram-Based Image Hashing for Searching Content-Preserving Copies. In: Shi, Y.Q., et al. Transactions on Data Hiding and Multimedia Security VI. Lecture Notes in Computer Science, vol 6730. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24556-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24556-5_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24555-8

  • Online ISBN: 978-3-642-24556-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics