Perceptual Image Hashing with Histogram of Color Vector Angles

  • Zhenjun Tang
  • Yumin Dai
  • Xianquan Zhang
  • Shichao Zhang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7669)

Abstract

Image hashing is an emerging technology for the need of, such as image authentication, digital watermarking, image copy detection and image indexing in multimedia processing, which derives a content-based compact representation, called image hash, from an input image. In this paper we study a robust image hashing algorithm with histogram of color vector angles. Specifically, the input image is first converted to a normalized image by interpolation and low-pass filtering. Color vector angles are then calculated. Thirdly, the histogram is extracted for those angles in the inscribed circle of the normalized image. Finally, the histogram is compressed to form a compact hash. We conduct experiments for evaluating the proposed hashing, and show that the proposed hashing is robust against normal digital operations, such as JPEG compression, watermarking embedding, scaling, rotation, brightness adjustment, contrast adjustment, gamma correction, and Gaussian low-pass filtering. Receiver operating characteristics (ROC) curve comparisons indicate that our hashing performs much better than three representative methods in classification between perceptual robustness and discriminative capability.

Keywords

Perceptual hashing image hashing image authentication color vector angle color histogram 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Qin, C., Chang, C.C., Chen, P.Y.: Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Processing 92, 1137–1150 (2012)CrossRefGoogle Scholar
  2. 2.
    Venkatesan, R., Koon, S.-M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: 7th IEEE International Conference on Image Processing, pp. 664–666. IEEE Press, New York (2000)Google Scholar
  3. 3.
    Lin, C.Y., Chang, S.F.: A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits System and Video Technology 11, 153–168 (2001)CrossRefGoogle Scholar
  4. 4.
    Lefebvre, F., Macq, B., Legat, J.-D.: RASH: Radon soft hash algorithm. In: 11th European Signal Processing Conference, pp. 299–302 (2002)Google Scholar
  5. 5.
    Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1, 215–230 (2006)CrossRefGoogle Scholar
  6. 6.
    Kozat, S.S., Venkatesan, R., Mihcak, M.K.: Robust perceptual image hashing via matrix invariants. In: 11th IEEE International Conference on Image Processing, pp. 3443–3446. IEEE Press, New York (2004)Google Scholar
  7. 7.
    Monga, V., Mihcak, M.K.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Transactions on Information Forensics and Security 2, 376–390 (2007)CrossRefGoogle Scholar
  8. 8.
    Ou, Y., Rhee, K.H.: A key-dependent secure image hashing scheme by using Radon transform. In: IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 595–598. IEEE Press, New York (2009)Google Scholar
  9. 9.
    Tang, Z., Wang, S., Zhang, X., Wei, W.: Structural feature-based image hashing and similarity metric for tampering detection. Fundamenta Informaticae 106, 75–91 (2011)MathSciNetGoogle Scholar
  10. 10.
    Dony, R.D., Wesolkowski, S.: Edge detection on color images using RGB vector angles. In: IEEE Canadian Conference on Electrical and Computer Engineering, vol. 2, pp. 687–692. IEEE Press, New York (1999)Google Scholar
  11. 11.
    Kim, N.W., Kim, T.Y., Choi, J.S.: Edge-Based Spatial Descriptor for Content-Based Image Retrieval. In: Leow, W.-K., Lew, M., Chua, T.-S., Ma, W.-Y., Chaisorn, L., Bakker, E.M. (eds.) CIVR 2005. LNCS, vol. 3568, pp. 454–464. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Processing Magazine 17, 58–64 (2000)CrossRefGoogle Scholar
  13. 13.
  14. 14.
    Fawcett, T.: An introduction to ROC analysis. Pattern Recognition Letters 27, 861–874 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Zhenjun Tang
    • 1
  • Yumin Dai
    • 1
  • Xianquan Zhang
    • 1
  • Shichao Zhang
    • 1
    • 2
  1. 1.Department of Computer ScienceGuangxi Normal UniversityGuilinP.R. China
  2. 2.Faculty of Information TechnologyUniversity of TechnologySydneyAustralia

Personalised recommendations