Skip to main content

An Image Perceptual Hashing Algorithm Based onĀ Convolutional Neural Networks

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2023)

Abstract

The conventional perceptual hashing algorithms are constrained to a singular global feature extraction algorithm and lack efficient scalability adaptation. To address this problem, an image-perceptual hashing algorithm based on convolutional neural networks is proposed in this paper. First of all, the entire image is convolved by the backbone network to obtain a feature map. The Region Proposal Network (RPN) is employed to generate multiple-sized proposal frames at each location by using sliding windows. Considering the complexity and diversity of the object, proposal boxes of various sizes and shapes are formulated, and the local features are comprehensively exploited in an image, thereby, generating a perceptual hash code that can represent the semantic features of an image strongly. Moreover, The Mean Square Error (MSE) loss is incorporated into the optimization process to evaluate the coincidence between the proposal frame and the actual frame, generating more representative hash codes. Finally, an image perceptual hash code with high intuitive features can be formulated through iterative training of the proposed convolutional neural networks. Extensive experimental results demonstrate that the proposed image perceptual hashing algorithm based on a convolutional neural network surpasses other state-of-the-art methods.

This work was supported by National Natural Science Foundation of China (62272255, 62302248, 62302249); National key research and development program of China (2021YFC3340600, 2021YFC3340602); Taishan Scholar Program of Shandong (tsqn202306251); Shandong Provincial Natural Science Foundation (ZR2020MF054, ZR2023QF018, ZR2023QF032, ZR2022LZH011), Ability Improvement Project of Science and Technology SMES in Shandong Province (2022TSGC2485, 2023TSGC0217); Jinan ā€œ20 Universitiesā€-Project of Jinan Research Leader Studio (2020GXRC056); Jinan ā€œNew 20 Universitiesā€-Project of Introducing Innovation Team (202228016); Youth Innovation Team of Colleges and Universities in Shandong Province (2022KJ124); The ā€œChunhui Planā€ Cooperative Scientific Research Project of Ministry of Education (HZKY20220482); Achievement transformation of science, education and production integration pilot project (2023CGZH-05), First Talent Research Project under Grant (2023RCKY131, 2023RCKY143), Integration Pilot Project of Science Education Industry under Grant (2023PX006, 2023PY060, 2023PX071).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ma, B., Shi, Y.Q.: A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forensics Secur. 11(9), 1914ā€“1927 (2016)

    ArticleĀ  Google ScholarĀ 

  2. Ma, B., Chang, L.L., Wang, C.P., et al.: Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping. Sig. Process. 172, 107544 (2020)

    ArticleĀ  Google ScholarĀ 

  3. Srivastava, M., Siddiqui, J., et al.: Local binary pattern based technique for content based image copy detection. In: 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and Its Control (PARC), pp. 374ā€“377. IEEE, Piscataway (2020)

    Google ScholarĀ 

  4. Qin, C., Liu, E.L., Feng, G.R., et al.: Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints. IEEE Trans. Circ. Syst. Video Technol. 31(11), 4523ā€“4537 (2020)

    ArticleĀ  Google ScholarĀ 

  5. Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proceedings of 3rd IEEE International Conference on Image Processing, vol. 3, pp. 227ā€“230. IEEE, Piscataway (2002)

    Google ScholarĀ 

  6. Bin, M.A., Yi-li, W.A.N.G., Jian, X.U., et al.: An image perceptual hash algorithm based on bidirectional generative adversarial network. Acta Electron. Sin. 51(5), 1405ā€“1412 (2023)

    Google ScholarĀ 

  7. Zhao, Y., Yuan, X.R.: Perceptual image hashing based on color structure and intensity gradient. IEEE Access 8, 26041ā€“26053 (2020)

    ArticleĀ  Google ScholarĀ 

  8. Tang, Z.J., Zhang, X.Q., et al.: Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forensics Secur. 11(1), 200ā€“214 (2015)

    ArticleĀ  Google ScholarĀ 

  9. Srivastava, M., Siddiqui, J., Ali, M.A.: Robust image hashing based on statistical features for copy detection. In: 2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UP-CON), pp. 490ā€“495. IEEE, Piscataway (2017)

    Google ScholarĀ 

  10. Yuan, X., Zhao, Y.: Perceptual image hashing based on three-dimensional global features and image energy. IEEE Access 9, 49325ā€“49337 (2021). https://doi.org/10.1109/ACCESS.2021.3069045

    ArticleĀ  Google ScholarĀ 

  11. Yuan, X.R., Zhao, Y.: Perceptual image hashing based on three-dimensional global features and image energy. IEEE Access 9, 49325ā€“49337 (2021)

    ArticleĀ  Google ScholarĀ 

  12. Hosny, K.M., Khedr, Y.M., Khedr, W.I., et al.: Robust image hashing using exact Gaussian-Hermite moments. IET Image Process. 12(12), 2178ā€“2185 (2018)

    ArticleĀ  Google ScholarĀ 

  13. Ouyang, J., Liu, Y.Z., Shu, H.Z.: Robust hashing for image authentication using SIFT feature and quaternion Zernike moments. Multimedia Tools Appl. 76(2), 2609ā€“2626 (2017)

    ArticleĀ  Google ScholarĀ 

  14. Wang, X.F., Xue, J.R., Zheng, Z.Q., et al.: Image forensic signature for content authenticity analysis. J. Vis. Commun. Image Representation 23(5), 782ā€“797 (2012)

    ArticleĀ  Google ScholarĀ 

  15. Yu, M., Tang, Z., Zhang, X., Zhong, B., Zhang, X.: Perceptual hashing with complementary color wavelet transform and compressed sensing for reduced-reference image quality assessment. IEEE Trans. Circ. Syst. Video Technol. 32(11), 7559ā€“7574 (2022). https://doi.org/10.1109/TCSVT.2022.3190273

    ArticleĀ  Google ScholarĀ 

  16. Tang, Z.J., Huang, L.Y., Zhang, X.Q., et al.: Robust image hashing based on color vector angle and Canny operator. AEU-Int. J. Electron. Commun. 70(6), 833ā€“841 (2016)

    ArticleĀ  Google ScholarĀ 

  17. Vadlamudi, L.N., Vaddell, R.P.V., Devara, V.: Robust image hashing using SIFT feature points and DWT approximation coefficients. ICT Express 4(3), 154ā€“159 (2018)

    ArticleĀ  Google ScholarĀ 

  18. Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Video Technol. 11(2), 153ā€“168 (2001)

    ArticleĀ  MathSciNetĀ  Google ScholarĀ 

  19. Huang, Z.Q., Liu, S.G.: Perceptual image hashing with texture and invariant vector distance for copy detection. IEEE Trans. Multimedia 23, 15161529 (2020)

    Google ScholarĀ 

  20. Swaminathan, A., Mao, Y.N., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(2), 215ā€“230 (2006)

    ArticleĀ  Google ScholarĀ 

  21. Qin, C., Chang, C.C., Tsou, P.L.: Robust image hashing using non-uniform sampling in discrete Fourier domain. Digit. Sig. Proc. 23(2), 578ā€“585 (2013)

    ArticleĀ  MathSciNetĀ  Google ScholarĀ 

  22. Huang, Z.Q., Tang, Z.J., Zhang, X.Q., et al.: Perceptual image hashing with locality preserving projection for copy detection. IEEE Trans. Dependable Secure Comput. 20(1), 463ā€“477 (2023)

    ArticleĀ  Google ScholarĀ 

  23. Tang, Z.J., Lao, H., Zhang, X.Q., et al.: Robust image hashing via DCT and LLE. Comput. Secur. 62, 133ā€“148 (2016)

    ArticleĀ  Google ScholarĀ 

  24. Zhu, X.F., Li, X.L., Zhang, S.C., et al.: Graph PCA hashing for similarity search. IEEE Trans. Multimedia 19(9), 2033ā€“2044 (2017)

    ArticleĀ  Google ScholarĀ 

  25. Ren, S., et al.: Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39(6), 1137ā€“1149 (2017)

    ArticleĀ  Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongjin Xian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, M., Qi, B., Xian, Y., Li, J. (2024). An Image Perceptual Hashing Algorithm Based onĀ Convolutional Neural Networks. In: Ma, B., Li, J., Li, Q. (eds) Digital Forensics and Watermarking. IWDW 2023. Lecture Notes in Computer Science, vol 14511. Springer, Singapore. https://doi.org/10.1007/978-981-97-2585-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-2585-4_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-2584-7

  • Online ISBN: 978-981-97-2585-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics