广西师范大学学报(自然科学版) ›› 2016, Vol. 34 ›› Issue (4): 9-18.doi: 10.16088/j.issn.1001-6600.2016.04.002

• 广西高校优秀中青年骨干教师培养工程论坛 • 上一篇    下一篇

基于PCA特征距离的图像哈希算法

唐振军1,2,杨帆1,2,黄紫晴1,2,劳欢1,2   

  1. 1.广西师范大学广西多源信息挖掘与安全重点实验室,广西桂林541004;
    2.广西师范大学计算机科学与信息工程学院,广西桂林541004
  • 收稿日期:2016-06-19 出版日期:2016-07-18 发布日期:2018-07-18
  • 通讯作者: 唐振军(1979—),男,广西桂平人,广西师范大学教授,博士。E-mail:tangzj230@163.com
  • 基金资助:
    国家自然科学基金资助项目(61300109, 61363034, 61562007);广西自然科学基金资助项目(2015GXNSFDA139040);广西“八桂学者”工程专项经费资助项目;广西高等学校优秀中青年骨干教师培养工程资助项目(GXGQ012013059);广西多源信息挖掘与安全重点实验室系统性研究基金资助项目(15-A-02-02, 14-A-02-02,13-A-03-01)

Image Hashing Algorithm Based on PCA Feature Distance

TANG Zhenjun1,2, YANG Fan1,2, HUANG Ziqing1,2, LAO Huan1,2   

  1. 1. Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin Guangxi 541004, China;
    2. College of Computer Science and Information Technology, Guangxi Normal University, Guilin Guangxi 541004, China
  • Received:2016-06-19 Online:2016-07-18 Published:2018-07-18

摘要: 本文将主成分分析(PCA)应用于图像哈希,设计基于特征距离的感知哈希算法。该算法从规范化图像中构造适合于数据降维的二次图像,接着对其进行PCA处理,用PCA降维特征的距离生成哈希序列。实验结果表明本文算法的接收机操作特性曲线的分类性能优于现有的3种哈希算法。大规模图像库的拷贝检测显示,本文算法有较好的拷贝检测性能。

关键词: 感知哈希函数, 主成分分析, 数据降维, 图像拷贝检测, 图像检索

Abstract: Principal component analysis (PCA) is applied to image hashing algorithm and a perceptual hashing algorithm based on characteristic distance is proposed. In the proposed algorithm, a secondary image suitable for data dimension reduction is first constructed from the normalized image. Then, PCA is used to process secondary image, and the distance between PCA features is finally exploited to form image hash. Experimental results illustrate that classification performance of the proposed algorithm measured with receiver operating characteristics (ROC) curve is better than those of three existing hashing algorithms. Copy detection under a large-scale image database shows that the proposed algorithm has good performance in detecting image copies.

Key words: perceptual hash function, principal component analysis (PCA), data dimension reduction, image copy detection, image retrieval

中图分类号: 

  • TP391
[1] 唐振军,戴玉敏,张显全,等.基于DCT特征点的感知图像Hash函数 [J]. 广西师范大学学报(自然科学版), 2012, 30(3):135-141.DOI:10.16088/j.issn.1001-6600.2012.03.010.
[2] TANG Zhenjun,WANG Shuozhong,ZHANG Xinpeng,et al.Robust image hashing for tamper detection using non-negative matrix factorization [J]. Journal of Ubiquitous Convergence and Technology, 2008, 2(1):18-26.
[3] VENKATESAN R,KOON S M,JAKUBOWSKI M H,et al.Robust image hashing[C]//Proceedings of 2000 International Conference on Image Processing.Piscataway,NJ:IEEE Press,2000:664-666.DOI:10.1109/ICIP.2000. 899541.
[4] 刘凯,唐振军,张显全,等.联合压缩感知和颜色向量角的彩色图像哈希方法[J].应用科学学报,2015,33(6):595-603. DOI:10.3969/j.issn.0255-8297.2015.06.003.
[5] MONGA V,EVANS B L.Perceptual image hashing via feature points: performance evaluation and tradeoffs[J]. IEEE Transactions on Image Processing,2006,15(11):3453-3466. DOI:10.1109/TIP.2006.881948.
[6] AHMED F,SIYAL M Y,ABBAS V U.A secure and robust hash-based scheme for image authentication[J]. Signal Processing,2010,90(5):1456-1470. DOI:10.1016/j.sigpro.2009.05.024.
[7] LIN C Y,CHANG S F.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Transactions on Circuits and Systems for Video Technology,2001,11(2):153-168. DOI:10.1109/76.905982.
[8] 秦川,张真诚,郭成.基于秘密共享的感知鲁棒图像Hash算法[J].计算机研究与发展,2012,49(8):1690-1698.
[9] TANG Zhenjun,YANG Fan,HUANG Liyan,et al.Robust image hashing with dominant DCT coefficients[J]. Optik-International Journal for Light and Electron Optics,2014,125(18):5102-5107.DOI:10.1016/j.ijleo.2014.05.015.
[10] LEFEBVRE F,MACQ B,LEGAT J D.RASH:Radon soft hash algorithm[C]//Proceedings of 11th European Signal Processing Conference. Piscataway, NJ:IEEE Press, 2002:299-302.
[11] LEI Yanqiang, WANG Yuangen, HUANG Jiwu.Robust image hash in Radon transform domain for authentication [J].Signal Processing:Image Communication,2011,26(6):280-288. DOI:10.1016/j.image.2011.04.007.
[12] OU Yang,RHEE K H.A key-dependent secure image hashing scheme by using Radon transform[C]//Proceedings of the 2009 International Symposium on Intelligent Signal Processing and Communication Systems. Piscataway, NJ:IEEE Press,2009:595-598. DOI:10.1109/ISPACS.2009.5383770.
[13] TANG Zhenjun, HUANG Liyan, YANG Fan,et al.Robust image hashing based on fan-beam transform[J]. ICIC Express Letters,2014,8(8):2365-2372.
[14] SWAMINATHAN A,MAO Yinian,WU Min.Robust and secure image hashing[J].IEEE Transactions on Information Forensics and Security,2006,1(2):215-230. DOI:10.1109/TIFS.2006.873601.
[15] WU Di,ZHOU Xuebing,NIU Xiamu.A novel image hash algorithm resistant to print-scan[J].Signal Processing, 2009,89(12):2415-2424. DOI:10.1016/j.sigpro.2009.05.016.
[16] QIN Chuan,CHANG Chinchen,TSOU Peiling.Robust image hashing using non-uniform sampling in discrete Fourier domain[J].Digital Signal Processing,2013,23(2):578-585.DOI:10.1016/j.dsp.2012.11.002.
[17] KOZAT S S,VENKATESAN R, MIHCAK M K.Robust perceptual image hashing via matrix invariants[C]// Proceedings of 2004 International Conference on Image Processing.Piscataway,NJ:IEEE Press,2004:3443-3446. DOI:10.1109/ICIP.2004.1421855.
[18] MONGA V,MIHCAK M K.Robust and secure image hashing via non-negative matrix factorizations[J].IEEE Transactions on Information Forensics and Security,2007,2(3):376-390.DOI:10.1109/TIFS.2007.902670.
[19] TANG Zhenjun,WANG Shuozhong,ZHANG Xinpeng,et al.Lexicographical framework for image hashing with implementation based on DCT and NMF[J].Multimedia Tools and Applications,2011,52(2/3):325-345.DOI: 10.1007/s11042-009-0437-y.
[20] TANG Zhenjun,ZHANG Xianquan,ZHANG Shichao.Robust perceptual image hashing based on ring partition and NMF[J].IEEE Transactions on Knowledge and Data Engineering,2014,26(3):711-724. DOI:10.1109/TKDE. 2013.45.
[21] GHOUTI L.Robust perceptual color image hashing using quaternion singular value decomposition[C]// Proceedings of 2014 IEEE International Conference on Acoustic, Speech and Signal Processing. Piscataway,NJ: IEEE Press,2014:3794-3798.DOI:10.1109/ICASSP.2014.6854311.
[22] LI Yuenan, LU Zheming, ZHU Ce, et al.Robust image hashing based on random Gabor filtering and dithered lattice vector quantization[J].IEEE Transactions on Image Processing,2012,21(4):1963-1980.DOI:10.1109/TIP.2011.2171698.
[23] TANG Zhenjun,DAI Yumin,ZHANG Xianquan,et al.Robust image hashing via colour vector angles and discrete wavelet transform[J].IET Image Processing,2014,8(3):142-149. DOI:10.1049/iet-ipr.2013.0332.
[24] ZHAO Yan,WANG Shuozhong,ZHANG Xinpeng,et al.Robust hashing for image authentication using Zernike moments and local features[J].IEEE Transactions on Information Forensics and Security,2013,8(1):55-63.DOI: 10.1109/TIFS.2012.2223680.
[25] PETITCOLAS F A P.Watermarking schemes evaluation[J].IEEE Signal Processing Magazine,2000,17(5):58-64. DOI:10.1109/79.879339.
[26] FAWCETT T. An introduction to ROC analysis[J].Pattern Recognition Letters,2006,27(8):861-874.DOI:10.1016/ j.patrec.2005.10.010.
[1] 赵鑫, 宋英强, 胡月明, 刘轶伦, 朱阿兴. 基于多源开放数据的城乡居民点空间布局优化[J]. 广西师范大学学报(自然科学版), 2020, 38(1): 26-40.
[2] 刘慧敏, 官冬杰, 张梦婕. 三峡库区生态安全后续发展胁迫因子及胁迫机理研究[J]. 广西师范大学学报(自然科学版), 2016, 34(3): 150-158.
[3] 濮玲, 李海朝, 濮御, 蒋红霞. 十二种常用中草药中微量元素的主成分分析[J]. 广西师范大学学报(自然科学版), 2014, 32(4): 96-100.
[4] 何茜, 李旭, 周伟, 李奇生. 缺须墨头鱼不同地理居群的形态分化[J]. 广西师范大学学报(自然科学版), 2013, 31(4): 128-133.
[5] 马媛媛, 吕康, 徐久成. 基于粒计算多层次结构相似度的图像检索[J]. 广西师范大学学报(自然科学版), 2013, 31(3): 127-131.
[6] 李志欣, 陈宏朝, 吴王景莉, 周生明. 基于概率主题建模的图像语义学习与检索[J]. 广西师范大学学报(自然科学版), 2012, 30(3): 125-134.
[7] 唐振军, 戴玉敏, 张显全, 张师超. 基于DCT特征点的感知图像Hash函数[J]. 广西师范大学学报(自然科学版), 2012, 30(3): 135-141.
[8] 李双群, 徐久成, 张灵均, 李晓艳. 基于相容粒的彩色图像检索算法[J]. 广西师范大学学报(自然科学版), 2011, 29(3): 173-178.
[9] 罗辛, 潘乔, 王洪亚, 陈美, 北研二. 基于SOFM的高速图像检索算法实现[J]. 广西师范大学学报(自然科学版), 2011, 29(2): 180-184.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!
版权所有 © 广西师范大学学报(自然科学版)编辑部
地址:广西桂林市三里店育才路15号 邮编:541004
电话:0773-5857325 E-mail: gxsdzkb@mailbox.gxnu.edu.cn
本系统由北京玛格泰克科技发展有限公司设计开发