scholarly journals HOUGH TRANSFORM GENERATED STRONG IMAGE HASHING SCHEME FOR COPY DETECTION

Author(s):  
Mayank Srivastava ◽  
Jamshed M Siddiqui ◽  
Mohammad Athar Ali

The rapid development of image editing software has resulted in widespread unauthorized duplication of original images. This has given rise to the need to develop robust image hashing technique which can easily identify duplicate copies of the original images apart from differentiating it from different images. In this paper, we have proposed an image hashing technique based on discrete wavelet transform and Hough transform, which is robust to large number of image processing attacks including shifting and shearing. The input image is initially pre-processed to remove any kind of minor effects. Discrete wavelet transform is then applied to the pre-processed image to produce different wavelet coefficients from which different edges are detected by using a canny edge detector. Hough transform is finally applied to the edge-detected image to generate an image hash which is used for image identification. Different experiments were conducted to show that the proposed hashing technique has better robustness and discrimination performance as compared to the state-of-the-art techniques. Normalized average mean value difference is also calculated to show the performance of the proposed technique towards various image processing attacks. The proposed copy detection scheme can perform copy detection over large databases and can be considered to be a prototype for developing online real-time copy detection system.   

2011 ◽  
Author(s):  
Egydio C. S. Caria ◽  
Trajano A. de A. Costa ◽  
João Marcos A. Rebello ◽  
Donald O. Thompson ◽  
Dale E. Chimenti

Author(s):  
Latha Parameswaran ◽  
K Anbumani

This chapter discusses a content-based authentication technique based on inter-coefficient relationship of Discrete Wavelet Transform (DWT). Watermark is generated from the first level DWT. An image digest (which is a binary string) is generated from the second level DWT. The watermark is embedded in the mid-frequency coefficients of first level DWT as directed by the image digest. Image authentication is done by computing the Completeness of Signature. The proposed scheme is capable of withstanding incidental image processing operations such as compression and identifies any malicious tampering done on the host image.


2014 ◽  
Vol 8 (3) ◽  
pp. 142-149 ◽  
Author(s):  
Zhenjun Tang ◽  
Liyan Huang ◽  
Fan Yang ◽  
Yumin Dai ◽  
Xianquan Zhang

Electronics ◽  
2018 ◽  
Vol 7 (8) ◽  
pp. 135 ◽  
Author(s):  
Nikolay Chervyakov ◽  
Pavel Lyakhov ◽  
Dmitry Kaplun ◽  
Denis Butusov ◽  
Nikolay Nagornov

In this paper, we analyze the noise quantization effects in coefficients of discrete wavelet transform (DWT) filter banks for image processing. We propose the implementation of the DWT method, making it possible to determine the effective bit-width of the filter banks coefficients at which the quantization noise does not significantly affect the image processing results according to the peak signal-to-noise ratio (PSNR). The dependence between the PSNR of the DWT image quality on the wavelet and the bit-width of the wavelet filter coefficients is analyzed. The formulas for determining the minimal bit-width of the filter coefficients at which the processed image achieves high quality (PSNR ≥ 40 dB) are given. The obtained theoretical results were confirmed through the simulation of DWT for a test image using the calculated bit-width values. All considered algorithms operate with fixed-point numbers, which simplifies their hardware implementation on modern devices: field-programmable gate array (FPGA), application-specific integrated circuit (ASIC), etc.


2013 ◽  
Vol 347-350 ◽  
pp. 2214-2217
Author(s):  
Qing Song Xu

With the rapid development of the network and the multimedia technical , how to protect the security of the multimedia informations becomes the popular topic on studies. As a new technique used to protect the copyright of digital productions , the digital watermark technique has drawn extensive attention . A digital watermarking algorithm based on discrete wavelet transform (DWT) was presented according to human visual properties in the paper . Then some attack analyses were given. Experimental results show that the watermarking scheme proposed in this paper is invisible and robust to cropping, and also has good robustness to compression, filtering, and noise adding.


Sign in / Sign up

Export Citation Format

Share Document