Special Issue: Information Security of Multimedia

Compact Image Hashing Algorithm Based on Opposite Color and Salient Region

Expand
  • 1. College of Electronics & Information Engineering, Shanghai University of Electric Power, Shanghai 200090, China;
    2. Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin 541004, Guangxi Province, China

Received date: 2019-07-26

  Revised date: 2019-07-30

  Online published: 2019-10-18

Abstract

In order to improve the recognition ability of algorithms by utilizing the color and local information of the image effectively, this paper proposes an image hashing algorithm based on color information and salient region. By reprocessing the input image, the proposed algorithm first obtains the color opponents' components and brightness components from the image. Then extracts the color features from the color opposition and the robust features of the salient areas from the image according to the visual attention weight matrix. Finally, the algorithm generates the final hashby combining and scrambling all these features. Experimental results show that the proposed algorithm performs with better image classification, shorter hash length and less computing time than the existing hash algorithms. Meanwhile, it also performs a good recognition ability in tampering detection application.

Cite this article

ZHAO Yan, ZHOU Xiaowei, SHEN Qi . Compact Image Hashing Algorithm Based on Opposite Color and Salient Region[J]. Journal of Applied Sciences, 2019 , 37(5) : 691 -703 . DOI: 10.3969/j.issn.0255-8297.2019.05.010

References

[1] Zhao Y, Wang S, Zhang X, et al. Robust hashing for image authentication using zernike moments and local features[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(1):55-63.
[2] Tang Z, Zhang X, Dai X. Robust image hash function using local color features[J]. AEUInternational Journal of Electronics and Communications, 2013, 67(8):717-722.
[3] Davarzani R, Mozaffari S, Yaghmaie K. Perceptual image hashing using center-symmetric local binary patterns[J]. Multimedia Tools and Applications, 2016, 75(8):4639-4667.
[4] Tang Z, Huang L, Zhang X. Robust image hashing based on color vector angle and Canny operator[J]. AEU-International Journal of Electronics and Communications, 2016, 70(6):833-841.
[5] Qin C, Chen X, Dong J. Perceptual image hashing with selective sampling for salient structure features[J]. Displays, 2016, 45:26-37.
[6] Tang Z, Zhang X, Li X. Robust image hashing with ring partition and invariant vector distance[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(1):200-214.
[7] Tang Z, Chen L, Zhang X. Robust image hashing with tensor decomposition[J]. IEEE Transactions on Knowledge and Data Engineering, 2019, 31(3):549-560.
[8] Tang Z, Lao H, Zhang X. Robust image hashing via DCT and LLE[J]. Computers & Security, 2016, 62:133-148.
[9] Tang Z, Ruan L, Qin C. Robust image hashing with embedding vector variance of LLE[J]. Digital Signal Processing, 2015, 43:17-27.
[10] Tang Z, Huang Z, Zhang X. Robust image hashing with multidimensional scaling[J]. Signal Processing, 2017, 137:240-250.
[11] 沈麒,赵琰. 基于小波分解的统计特征哈希[J]. 应用科学学报,2018, 3(2):247-254. Shen Q, Zhao Y. Statistical feature hashing based on wavelet decomposition[J]. Journal of Applied Sciences, 2018, 36(02):247-254.
[12] Tang Z, Zhang X, Dai Y. Perceptual image hashing using local entropies and DWT[J]. Journal of Photographic Science, 2013, 61(2):241-251.
[13] 沈麒,赵琰. 面向拷贝检测的图像哈希算法[J]. 计算机应用研究,2019, 36(2):611-614+620. Shen Q, Zhao Y. Image hash algorithm for copy detection[J]. Application Research of Computers, 2019, 36(2):611-614+620.
[14] Srivastava M, Siddiqui J, Ali M A. Robust image hashing based on statistical features for copy detection[C]//IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering. IEEE, 2017:490-495.
[15] Qin C, Chen X, Luo X. Perceptual image hashing bis dual-cross pattern encoding and salient structure detection[J]. Information Sciences, 2018, 423:284-302.
[16] Engel S, Zhang X, Wandell B. Colour tuning in human visual cortex measured with functional magnetic resonance imaging[J]. Nature, 1997, 388(6637):68-71.
[17] Yan C, Pun C, Yuan X. Quaternion-based image hashing for adaptive tampering localization[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12):2664-2677.
[18] Ma Y F, Hua X S, Lu L. A generic framework of user attention model and its application in video summarization[J]. IEEE Transactions on Multimedia, 2005, 7(5):907-919.
[19] Qin C, Chen X, Dong J. Perceptual image hashing with selective sampling for salient structure features[J]. Displays, 2016, 45:26-37.
[20] 赵琰,魏为民. 用于图像认证和窜改检测的稳健图像摘要[J]. 计算机应用研究,2011, 28(5):1929-1931+1939. Zhao Y, Wei W. Robust image hashing for image authentication and tampering detection[J]. Application Research of Computers, 2011, 28(5):1929-1931+1939.
[21] Fawcett T. An introduction to ROC analysis[J]. Pattern Recognition Letters, 2006, 27(8):861-874.
[22] Redmon J. Pascal VOC dataset mirror[EB/OL]. (2012)[2017-10-07]. https://pjreddie.com/projects/pascal-voc-dataset-mirror/.
Outlines

/