Block-based image hashing with restricted blocking strategy for rotational robustness
13 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Block-based image hashing with restricted blocking strategy for rotational robustness

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
13 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Image hashing is a potential solution for image content authentication (a desired image hashing algorithm should be robust to common image processing operations and various geometric distortions). In the literature, researchers pay more attention to block-based image hashing algorithms due to their robustness to common image processing operations (such as lossy compression, low-pass filtering, and additive noise). However, the block-based hashing strategies are sensitive to rotation processing operations. This indicates that the robustness of the block-based hashing methods against rotation operations is an important issue. Towards this direction, in this article we propose a restricted blocking strategy by investigating effect of two rotation operations on an image and its blocks in both theoretical and experimental ways. Furthermore, we apply the proposed blocking strategy for the recently reported non-negative matrix factorization (NMF) hashing. Experimental results have demonstrated the validity of the block-based hashing algorithms with restricted blocking strategy for rotation operations.

Sujets

Informations

Publié par
Publié le 01 janvier 2012
Nombre de lectures 6
Langue English

Extrait

Xiang and Yang EURASIP Journal on Advances in Signal Processing 2012, 2012:77
http://asp.eurasipjournals.com/content/2012/1/77
RESEARCH Open Access
Block-based image hashing with restricted
blocking strategy for rotational robustness
1* 2Shijun Xiang and Jianquan Yang
Abstract
Image hashing is a potential solution for image content authentication (a desired image hashing algorithm should
be robust to common image processing operations and various geometric distortions). In the literature, researchers
pay more attention to block-based image hashing algorithms due to their robustness to common image
processing operations (such as lossy compression, low-pass filtering, and additive noise). However, the block-based
hashing strategies are sensitive to rotation processing operations. This indicates that the robustness of the block-
based hashing methods against rotation operations is an important issue. Towards this direction, in this article we
propose a restricted blocking strategy by investigating effect of two rotation operations on an image and its blocks
in both theoretical and experimental ways. Furthermore, we apply the proposed blocking strategy for the recently
reported non-negative matrix factorization (NMF) hashing. Experimental results have demonstrated the validity of
the block-based hashing algorithms with restricted blocking strategy for rotation operations.
Keywords: image hashing, non-negative matrix factorization, rotation, restricted random blocking
1. Introduction insensitive to those common geometric deformation,
With the development of the Internet and multimedia lossy compression and filtering operations, which do dis-
processing techniques, more and more digital media pro- tort the image but preserve its visual quality.
ducts become available through different online services Media hashing can be broadly classified into audio hash-
and easy to distribute illegal copies. Recently, multimedia ing [9,10], video hashing [11,12] and image hashing
hashing functions [1,2] have been introduced as a poten- [7,8,13-21] according to the diversity of media dimension-
tial solution for tracing the unauthorized use of digital ality space. In this article, we are focusing on image hash-
media files since the traditional cryptography hash func- ing. In the literature, therearealotrobustimagehash
tions (such as MD5, SHA-1) cannot satisfy the require- functions. In [13], Fridrich and Goljan addressed a robust
ments of multimedia content authentication because the image hash for tamper control problem by mapping image
cryptographic hash is sensitive to every single bit of blocks into key-based template. In [14], a robust image
input. In the literature, the techniques used for image hash was used for indexing and database searching by
authentication can be classified into two categories: (1) using the statistic property of wavelet coefficients of image
watermark based [3-6] and (2) media hash based [7,8]. block. Perceptual image hashing was also used for con-
The main difference between a watermark (robust [3], tent-dependent key generation in video watermarking
reversible [4], fragile [5] and semi-fragile [6]) and a hash [15]. The hash methods proposed in [13,14] were aiming
to coping with common image processing operations.is that the embedding process of the former requires the
With another consideration of coping with geometric dis-content of the media to change. Robustness of media
hashing is a desired aspect. Robustness means that the tortions, some researchers presented a few special image
hash should be resistant to content-preserving signal hash functions, such as in [16-21]]. In [16], the authors
processing operations, e.g., image hashing should be introduced an iterative geometric image hash method by
quantizing the low-frequency components of an image
into a binary image, which is further filtered by iterative
* Correspondence: xiangshijun@gmail.com filter in order to obtain a stable geometric shape to gener-1School of Information Science and Technology, Jinan University, Guangzhou
ate the hash with resistance to geometric distortion.510632, China
Full list of author information is available at the end of the article
© 2012 Xiang and Yang; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons
Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in
any medium, provided the original work is properly cited.Xiang and Yang EURASIP Journal on Advances in Signal Processing 2012, 2012:77 Page 2 of 13
http://asp.eurasipjournals.com/content/2012/1/77
In [17], the authors proposed two robust hashing schemes cess of a NMF hashing algorithm. This is followed by a
based on the invariance of Fourier-Mellin transform to detailed mathematical analysis on the effect of two image
affine transform, and later the schemes were improved by rotation modes on images. By using the new blocking
considering both security and robustness [18]. In [19], Lu method, we then test the robustness performance of the
and Hsu addressed a mesh-based image hashing method NMF hashing algorithm for two image rotation opera-
by using the mesh insensitivity to geometric distortions. tions. Finally, we draw the conclusions.
Monga and Mihçak addressed a robust and secure image
hashing function in [20], whichprovidesrobustnessto 2. NMF-based image hashing
affine transforms since the effect of geometric attacks on 2.1. NMF
image blocks in the spatial domain manifests (approxi- The NMF is a Matrix decomposition method [22]. It is
mately) as independent and identically distributed noise restricted by the conditions that in the Matrix all ele-
on non-negative matrix factorization vectors. By using the ments are nonnegative. The mathematical description is
insensitivity of histogram in shape to geometric attacks, addressed as follows:
Xiang et al. proposed a histogram-based image hashing Given am×n nonnegative matrices V, looking for
algorithm for various geometric distortions in [21]. In [5], nonnegative factor matrixW andH, making
a key-dependent JPEG2000-based robust hashing method m×r r×n
V ≈ WH(W ∈R , H ∈R ), (1)was addressed for secure image authentication. Consider-
ing various attacks, Liu et al. [6] introduced Fast Johnson- Here, each column inW can be regarded as a vector.
Lindenstrauss Transform and content-based fingerprint, Therefore, each column in V is the linear combination
to combine different features together. of the base vectors. NMF is an approximation procedure
From the above introduction, we can see that the strat- to the original matrix in a distance metric. In the NMF
egy to divide an image into blocks for hashing is often literature, two popular cost functions have been studied.
used (such as [13,14,20]). Usually, block-based image The first is the classical Euclidean distance, given by
hashing algorithms can provide an inherent ability to tam-
1⎛ ⎞per control problem and are robust to common image 2n
2processing operations. However, image block-based hash (2)⎝ ⎠ (W, H) ≡ ||v − Wh || = ||V − WH||,E j j 2
functions are very sensitive to rotation operations since j=1
the rotation will make the content difference between an
Another measure usually used in practice is K-L diver-image block and its rotated versions. Towards this pro-
gence (Kullback-Leibler divergence)blem, in this article we investigate the effect of rotation
operations on an image and its blocks. Our motivation is m n Vij
(V||WH) ≡ V log −V +[WH] ,to find the effect and then propose a new blocking strategy D ij r ij (3)ijW Hil ljl=1i=1 j=1to improve the performance of the block-based image
hashing algorithm for rotation operations. There are two The above measure is known as the generalized Kull-
kinds of rotation modes: loose based and crop based. The back-Leibler (KL) divergence. The NMF’sgoalisto
main difference between a loose rotation and a crop rota- minimize the distance between matrix V and WH.In
tion is that output images of the former have a bigger size this article, we choose Euclidean distance as the objec-
than the rotated image while the later remains the size by tive function of the NMF. Use the following iteration
cropping the boundaries. By analyzing the two modes of formulas [16], to obtain the matrix W and H until the
rotation operations in mathematical way, we propose a Θ (W,H) value reaches a local minimum:E
restricted randomized blocking strategy to eliminate the
T T[W V]effect of rotation. The basic idea is to extract the central [VH ]aj iaH ←H ,W ←W , (4)aj aj ia iaT Tcontent of an image for the use of a block-based hashing. [W WH] [WHH ]aj ia
In order to measure the effectiveness of the proposed
blocking strategy, we take non-negative matrix factoriza-
tion (NMF) hashing algorithm proposed in [20] as an 2.2. NMF-NMF-SQ hashing algorithm
example of block-based hashing algorithms to report Figure 1 shows the calculation process of a NMF-NMF-
experimental results. Simulation results show that the SQ hashing algorithm proposed in [20], described as fol-
hashing algorithm with the proposed blocking strategy can lows:
provide a stronger robustness to the two rotational
operations. 1) Given an image, using the private key k to1
m×mThe remainder of this article is organized as follows. In pseudorandomly select sub-images A,(A Î R ,1i i
the following section, we describe the computation pro- ≤ i ≤ p).Xia

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents