Journal of Guangxi Normal University(Natural Science Edition) ›› 2016, Vol. 34 ›› Issue (4): 9-18.doi: 10.16088/j.issn.1001-6600.2016.04.002

Previous Articles     Next Articles

Image Hashing Algorithm Based on PCA Feature Distance

TANG Zhenjun1,2, YANG Fan1,2, HUANG Ziqing1,2, LAO Huan1,2   

  1. 1. Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin Guangxi 541004, China;
    2. College of Computer Science and Information Technology, Guangxi Normal University, Guilin Guangxi 541004, China
  • Received:2016-06-19 Online:2016-07-18 Published:2018-07-18

Abstract: Principal component analysis (PCA) is applied to image hashing algorithm and a perceptual hashing algorithm based on characteristic distance is proposed. In the proposed algorithm, a secondary image suitable for data dimension reduction is first constructed from the normalized image. Then, PCA is used to process secondary image, and the distance between PCA features is finally exploited to form image hash. Experimental results illustrate that classification performance of the proposed algorithm measured with receiver operating characteristics (ROC) curve is better than those of three existing hashing algorithms. Copy detection under a large-scale image database shows that the proposed algorithm has good performance in detecting image copies.

Key words: perceptual hash function, principal component analysis (PCA), data dimension reduction, image copy detection, image retrieval

CLC Number: 

  • TP391
[1] 唐振军,戴玉敏,张显全,等.基于DCT特征点的感知图像Hash函数 [J]. 广西师范大学学报(自然科学版), 2012, 30(3):135-141.DOI:10.16088/j.issn.1001-6600.2012.03.010.
[2] TANG Zhenjun,WANG Shuozhong,ZHANG Xinpeng,et al.Robust image hashing for tamper detection using non-negative matrix factorization [J]. Journal of Ubiquitous Convergence and Technology, 2008, 2(1):18-26.
[3] VENKATESAN R,KOON S M,JAKUBOWSKI M H,et al.Robust image hashing[C]//Proceedings of 2000 International Conference on Image Processing.Piscataway,NJ:IEEE Press,2000:664-666.DOI:10.1109/ICIP.2000. 899541.
[4] 刘凯,唐振军,张显全,等.联合压缩感知和颜色向量角的彩色图像哈希方法[J].应用科学学报,2015,33(6):595-603. DOI:10.3969/j.issn.0255-8297.2015.06.003.
[5] MONGA V,EVANS B L.Perceptual image hashing via feature points: performance evaluation and tradeoffs[J]. IEEE Transactions on Image Processing,2006,15(11):3453-3466. DOI:10.1109/TIP.2006.881948.
[6] AHMED F,SIYAL M Y,ABBAS V U.A secure and robust hash-based scheme for image authentication[J]. Signal Processing,2010,90(5):1456-1470. DOI:10.1016/j.sigpro.2009.05.024.
[7] LIN C Y,CHANG S F.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Transactions on Circuits and Systems for Video Technology,2001,11(2):153-168. DOI:10.1109/76.905982.
[8] 秦川,张真诚,郭成.基于秘密共享的感知鲁棒图像Hash算法[J].计算机研究与发展,2012,49(8):1690-1698.
[9] TANG Zhenjun,YANG Fan,HUANG Liyan,et al.Robust image hashing with dominant DCT coefficients[J]. Optik-International Journal for Light and Electron Optics,2014,125(18):5102-5107.DOI:10.1016/j.ijleo.2014.05.015.
[10] LEFEBVRE F,MACQ B,LEGAT J D.RASH:Radon soft hash algorithm[C]//Proceedings of 11th European Signal Processing Conference. Piscataway, NJ:IEEE Press, 2002:299-302.
[11] LEI Yanqiang, WANG Yuangen, HUANG Jiwu.Robust image hash in Radon transform domain for authentication [J].Signal Processing:Image Communication,2011,26(6):280-288. DOI:10.1016/j.image.2011.04.007.
[12] OU Yang,RHEE K H.A key-dependent secure image hashing scheme by using Radon transform[C]//Proceedings of the 2009 International Symposium on Intelligent Signal Processing and Communication Systems. Piscataway, NJ:IEEE Press,2009:595-598. DOI:10.1109/ISPACS.2009.5383770.
[13] TANG Zhenjun, HUANG Liyan, YANG Fan,et al.Robust image hashing based on fan-beam transform[J]. ICIC Express Letters,2014,8(8):2365-2372.
[14] SWAMINATHAN A,MAO Yinian,WU Min.Robust and secure image hashing[J].IEEE Transactions on Information Forensics and Security,2006,1(2):215-230. DOI:10.1109/TIFS.2006.873601.
[15] WU Di,ZHOU Xuebing,NIU Xiamu.A novel image hash algorithm resistant to print-scan[J].Signal Processing, 2009,89(12):2415-2424. DOI:10.1016/j.sigpro.2009.05.016.
[16] QIN Chuan,CHANG Chinchen,TSOU Peiling.Robust image hashing using non-uniform sampling in discrete Fourier domain[J].Digital Signal Processing,2013,23(2):578-585.DOI:10.1016/j.dsp.2012.11.002.
[17] KOZAT S S,VENKATESAN R, MIHCAK M K.Robust perceptual image hashing via matrix invariants[C]// Proceedings of 2004 International Conference on Image Processing.Piscataway,NJ:IEEE Press,2004:3443-3446. DOI:10.1109/ICIP.2004.1421855.
[18] MONGA V,MIHCAK M K.Robust and secure image hashing via non-negative matrix factorizations[J].IEEE Transactions on Information Forensics and Security,2007,2(3):376-390.DOI:10.1109/TIFS.2007.902670.
[19] TANG Zhenjun,WANG Shuozhong,ZHANG Xinpeng,et al.Lexicographical framework for image hashing with implementation based on DCT and NMF[J].Multimedia Tools and Applications,2011,52(2/3):325-345.DOI: 10.1007/s11042-009-0437-y.
[20] TANG Zhenjun,ZHANG Xianquan,ZHANG Shichao.Robust perceptual image hashing based on ring partition and NMF[J].IEEE Transactions on Knowledge and Data Engineering,2014,26(3):711-724. DOI:10.1109/TKDE. 2013.45.
[21] GHOUTI L.Robust perceptual color image hashing using quaternion singular value decomposition[C]// Proceedings of 2014 IEEE International Conference on Acoustic, Speech and Signal Processing. Piscataway,NJ: IEEE Press,2014:3794-3798.DOI:10.1109/ICASSP.2014.6854311.
[22] LI Yuenan, LU Zheming, ZHU Ce, et al.Robust image hashing based on random Gabor filtering and dithered lattice vector quantization[J].IEEE Transactions on Image Processing,2012,21(4):1963-1980.DOI:10.1109/TIP.2011.2171698.
[23] TANG Zhenjun,DAI Yumin,ZHANG Xianquan,et al.Robust image hashing via colour vector angles and discrete wavelet transform[J].IET Image Processing,2014,8(3):142-149. DOI:10.1049/iet-ipr.2013.0332.
[24] ZHAO Yan,WANG Shuozhong,ZHANG Xinpeng,et al.Robust hashing for image authentication using Zernike moments and local features[J].IEEE Transactions on Information Forensics and Security,2013,8(1):55-63.DOI: 10.1109/TIFS.2012.2223680.
[25] PETITCOLAS F A P.Watermarking schemes evaluation[J].IEEE Signal Processing Magazine,2000,17(5):58-64. DOI:10.1109/79.879339.
[26] FAWCETT T. An introduction to ROC analysis[J].Pattern Recognition Letters,2006,27(8):861-874.DOI:10.1016/ j.patrec.2005.10.010.
[1] MA Yuan-yuan, LÜ Kang, XU Jiu-cheng. Image Retrieval of Multi-level Similarity Based on Granular Computing [J]. Journal of Guangxi Normal University(Natural Science Edition), 2013, 31(3): 127-131.
[2] LI Zhi-xin, CHEN Hong-chao, WU Jing-li, ZHOU Sheng-ming. Semantic Learning and Retrieval of Images Based on Probabilistic Topic Modeling [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(3): 125-134.
[3] TANG Zhen-jun, DAI Yu-min, ZHANG Xian-quan, ZHANG Shi-chao. Perceptual Image Hash Function Using DCT-Based Feature Points [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(3): 135-141.
[4] LI Shuang-qun, XU Jiu-cheng, ZHANG Ling-jun, LI Xiao-yan. Color Image Retrieval Based on Tolerance Granules [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(3): 173-178.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!