Journal of Guangxi Normal University(Natural Science Edition) ›› 2012, Vol. 30 ›› Issue (3): 135-141.

Previous Articles     Next Articles

Perceptual Image Hash Function Using DCT-Based Feature Points

TANG Zhen-jun, DAI Yu-min, ZHANG Xian-quan, ZHANG Shi-chao   

  1. College of Computer Science and Information Technology,GuangxiNormal University,Guilin Guangxi 541004,China
  • Received:2012-05-18 Online:2012-09-20 Published:2018-12-04

Abstract: This paper proposes a perceptual image hash function using discrete cosine transform (DCT) based feature points.Specifically,the input image is first mapped to a normalized image by preprocessing.The normalized image is then divided into non-overlapping blocks.Next,two dimensional DCT is applied toeach block,and AC coefficients of each block are used to form a feature point.Finally,gravity center of the feature points is calculated and the hash is obtained by computing the Euclidian distance between the gravity center and each feature point.Experiments show that the proposed algorithm is robust against normal digital operations and reaches good discrimination.Receiver operating characteristics (ROC) curve comparisons indicate that the proposed algorithm outperforms three well-known existing algorithms.

Key words: Image hash, hash function, image retrieval, copy detection, receiver operating characteristics (ROC)

CLC Number: 

  • TP391.411
[1] VENKATESAN R,KOON S,JAKUBOWSKI M,et al.Robust image hashing[C]//Proceedings of IEEE International Conference on Image Processing.Los Alamitos,CA:IEEE Computer Society,2000:664-666.
[2] LIN Ching-yung,CHANG Shih-fu.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J].IEEE Transactions on Circuits and Systems for Video Technology,2001,11(2):153-168.
[3] LEFEBVRE F,MACQ B,LEGA J D.RASH:Radon Soft Hash algorithm[C]//Proceedings of European Signal Processing Conference.Toulouse,France:TESA,2002:299-302.
[4] De ROOVER C,De VLEESCHOUWER C,LEFEBVRE F,et al.Robust video hashing basedon radial projections of key frames[J].IEEE Transactions On Signal Processing,2005,53(10):4020-4037.
[5] KOZAT S S,VENKATESAN R,MIHCAK K.Robust perceptual image hashingvia matrixinvariants[C]//Proceedings of IEEE International Conference on Image Processing.Los Alamitos,CA:IEEE Computer Society,2004:3443-3446.
[6] MONGA V,MIHCAK M K.Robust and secure image hashing via non-negative matrixfactorizations[J].IEEE Transactions on Information Forensics and Security,2007,2(3):376-390.
[7] TANG Zhen-jun,WANG Shuo-zhong,ZHANG Xin-peng,et al.Robust imagehashing fortamper detection using non-negative matrix factorization[J].Journal of Ubiquitous Convergence and Technology,2008,2(1):18-26.
[8] OU Yang,RHEE K H.A key-dependent secure image hashing scheme by using Radontransform[C]//Proceedings of the IEEE International Symposium on IntelligentSignal Processing and Communication Systems.Los Alamitos,CA:IEEE Computer Society,2009:595-598.
[9] 唐振军,魏为民,张新鹏,等.用于图像检索的稳健Hash[J].东南大学学报:自然科学版,2007,37(S1):105-108.
[10] 唐振军,王朔中,魏为民,等.用于图像Hash的视觉相似度客观评价测度[J].中国图象图形学报,2008,13(10):2040-2043.
[11] TANG Zhen-jun,WANG Shuo-zhong,ZHANG Xin-peng,et al.Structuralfeature-basedimage hashing and similarity metric for tampering detection[J].Fundamenta Informaticae,2011,106(1):75-91.
[12] PETITCOLAS F A P.Watermarking schemes evaluation[J].IEEE SignalProcessing Magazine,2000,17(5):58-64.
[13] FAWCETT T.An introduction to ROC analysis[J].Pattern Recognition Lettrs,2006,27(8):861-874.
[1] TANG Zhenjun. Image Hashing Algorithm Based on PCA Feature Distance [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(4): 9-18.
[2] MA Yuan-yuan, LÜ Kang, XU Jiu-cheng. Image Retrieval of Multi-level Similarity Based on Granular Computing [J]. Journal of Guangxi Normal University(Natural Science Edition), 2013, 31(3): 127-131.
[3] LI Zhi-xin, CHEN Hong-chao, WU Jing-li, ZHOU Sheng-ming. Semantic Learning and Retrieval of Images Based on Probabilistic Topic Modeling [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(3): 125-134.
[4] LI Shuang-qun, XU Jiu-cheng, ZHANG Ling-jun, LI Xiao-yan. Color Image Retrieval Based on Tolerance Granules [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(3): 173-178.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!