Robust Image Hashing with Isomap and Saliency Map for Copy Detection

2021 ◽  
pp. 1-1
Author(s):  
Xiaoping Liang ◽  
Zhenjun Tang ◽  
Jingli Wu ◽  
Zhixin Li ◽  
Xinpeng Zhang
Author(s):  
Zhenjun Tang ◽  
Mengzhu Yu ◽  
Heng Yao ◽  
Hanyun Zhang ◽  
Chunqiang Yu ◽  
...  

Abstract Image hashing is an efficient technique of many multimedia systems, such as image retrieval, image authentication and image copy detection. Classification between robustness and discrimination is one of the most important performances of image hashing. In this paper, we propose a robust image hashing with singular values of quaternion singular value decomposition (QSVD). The key contribution is the innovative use of QSVD, which can extract stable and discriminative image features from CIE L*a*b* color space. In addition, image features of a block are viewed as a point in the Cartesian coordinates and compressed by calculating the Euclidean distance between its point and a reference point. As the Euclidean distance requires smaller storage than the original block features, this technique helps to make a discriminative and compact hash. Experiments with three open image databases are conducted to validate efficiency of our image hashing. The results demonstrate that our image hashing can resist many digital operations and reaches a good discrimination. Receiver operating characteristic curve comparisons illustrate that our image hashing outperforms some state-of-the-art algorithms in classification performance.


2020 ◽  
Vol 2020 (1) ◽  
Author(s):  
Zhenjun Tang ◽  
Hanyun Zhang ◽  
Shenglian Lu ◽  
Heng Yao ◽  
Xianquan Zhang

2015 ◽  
Vol 43 ◽  
pp. 17-27 ◽  
Author(s):  
Zhenjun Tang ◽  
Linlin Ruan ◽  
Chuan Qin ◽  
Xianquan Zhang ◽  
Chunqiang Yu

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Zhenjun Tang ◽  
Zixuan Yu ◽  
Zhixin Li ◽  
Chunqiang Yu ◽  
Xianquan Zhang

Image hashing has attracted much attention of the community of multimedia security in the past years. It has been successfully used in social event detection, image authentication, copy detection, image quality assessment, and so on. This paper presents a novel image hashing with low-rank representation (LRR) and ring partition. The proposed hashing finds the saliency map by the spectral residual model and exploits it to construct the visual representation of the preprocessed image. Next, the proposed hashing calculates the low-rank recovery of the visual representation by LRR and extracts the rotation-invariant hash from the low-rank recovery by ring partition. Hash similarity is finally determined by L2 norm. Extensive experiments are done to validate effectiveness of the proposed hashing. The results demonstrate that the proposed hashing can reach a good balance between robustness and discrimination and is superior to some state-of-the-art hashing algorithms in terms of the area under the receiver operating characteristic curve.


2019 ◽  
Vol 15 (12) ◽  
pp. 6541-6550 ◽  
Author(s):  
Muhammad Sajjad ◽  
Ijaz Ul Haq ◽  
Jaime Lloret ◽  
Weiping Ding ◽  
Khan Muhammad

2010 ◽  
Vol 439-440 ◽  
pp. 1018-1023
Author(s):  
De Long Cui ◽  
Yong Fu Liu ◽  
Jing Long Zuo

In order to improve the sensitive to illegal manipulations of image hashing, a novel robust image hashing algorithm based on fractional Fourier transform (FRFT) for detecting and localizing image tampering is proposed in this paper. The framework of generating an image hashing includes three steps: preprocessing, feature extracting and post processing. The robust hashing sequence is obtained by FRFT coefficients of image blocks. The security of proposed algorithm is totally depended on the orders of FRFT which are saved as secret keys. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as JPEG compression, mid-filtering, and rotation, more importantly the tampered place can be identified accurately.


Sign in / Sign up

Export Citation Format

Share Document