Special Issue: Information Security of Multimedia Contents

Statistical Feature Hashing Based on Wavelet Decomposition

Expand
  • College of Electronics and Information Engineering, Shanghai University of Electric Power, Shanghai 200090, China

Received date: 2018-01-31

  Online published: 2018-03-31

Abstract

A statistical feature hash based on wavelet decomposition is proposed for the improvement of the image copy detection efciency and the recognition performance. In the proposal, an approximate image is frstly extracted from a preprocessed image by the threeorder wavelet decomposition. Secondly, the statistical features of the row and column of the approximate image of the third wavelet decomposition are extracted, and the L2 distance of the row and column statistical features is used as the invariant feature. All the invariant features are combined and used as the fnal hash of the image. Experimental results show that the proposed hash algorithm has better performance and higher efciency in copy detection.

Cite this article

SHEN Qi, ZHAO Yan . Statistical Feature Hashing Based on Wavelet Decomposition[J]. Journal of Applied Sciences, 2018 , 36(2) : 247 -254 . DOI: 10.3969/j.issn.0255-8297.2018.02.004

References

[1] Kim C. Content-based image copy detection[J]. Signal Processing Image Communication, 2003, 18(3):169-184.
[2] Tang Z, Yang F, Huang L, Wei M. DCT and DWT based image hashing for copy detection[J]. ICIC Express Letters, 2013, 7(11):2961-2967.
[3] Tang Z, Yang F, Huang L, Zhang X. Robust image hashing with dominant DCT coefcients[J]. Optik-International Journal for Light and Electron Optics, 2014, 125(18):5102-5107.
[4] Venkatesan R, Koon S M, Jakubowski M H, Moulin P. Robust image hashing[C]//The IEEE International Conference on Image Processing (ICIP), 2000:664-666
[5] 康晓兵,魏生民. 基于小波域奇异值分解的图像拷贝检测[J]. 计算机应用,2010, 30(4):917-920. Kang X B, Wei S M. Image copy detection based on SVD in wavelet domain[J]. Journal of Computer Applications, 2010, 30(4):917-920. (in Chinese)
[6] Ou Y, Rhee K H. A key-dependent secure image hashing scheme by using Radon transform[C]//International Symposium on Intelligent Signal Processing and Communication Systems. IEEE Xplore, 2009:595-598.
[7] Srivastava M, Siddiqui J, Ali M A. Robust image hashing based on statistical features for copy detection[C]//IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering. IEEE, 2017:490-495.
[8] Ling H, Cheng H, Ma Q, Yan W Q. Efcient image copy detection using multi-scale fngerprints[J]. IEEE Multimedia, 2012, 19(1):60-69.
[9] Monga V, Mihcak M K. Robust and secure image hashing via non-negative matrix factorizations[J]. IEEE Transactions on Information Forensics & Security, 2007, 2(3):376-390.
[10] 唐振军,杨帆,黄紫晴,劳欢. 基于PCA特征距离的图像哈希算法[J]. 广西师范大学学报(自然科学版),2016, 34(4):9-18. Tang Z J, Yang F, Huang Z Q, Lao H. Image hashing algorithm based on PCA feature distance[J]. Journal of Guangxi Normal University (Natural Science Edition), 2016, 34(4):9-18. (in Chinese)
[11] 尚月赟,马龙飞,叶登攀. 基于熵特征融合的拷贝检测方法研究[J]. 计算机工程与应用,2012, 48(16):80-84. Shang Y Y, Ma L F, Ye D P. Research of entropy feature fusion based copy detection method[J]. Computer Engineering & Applications, 2012, 48(16):80-84. (in Chinese)
[12] 邹复好,李晓威,许治华,凌贺飞,李平. 抗旋转和等比缩放失真的图像拷贝检测技术[J]. 计算机研究与发展,2009, 46(8):1349-1356. Zou F H, Li X W, Xu Z H, Lin H F, Li P. Image copy detection with rotation and scaling tolerance[J]. Journal of Computer Research & Development, 2009, 46(8):1349-1356. (in Chinese)
[13] 刘炜,欧阳建权,李泽洲,张敏. 运用边缘方向直方图进行图像拷贝检测[J]. 计算机工程与应用,2010, 46(31):184-187. Liu W,Ou-Yang J Q,Li Z Z,Zhang M. Edge histogram-based image copy detection algorithm[J]. Computer Engineering and Applications, 2010, 46(31):184-187. (in Chinese)
[14] 马晓普,刘妍. 基于统计特征的鲁棒图像拷贝检测技术[J]. 计算机应用,2009, 29(8):2233-2235. Ma X P, Liu Y. Robust image copy detection based on statistical features[J]. Journal of Computer Applications, 2009, 29(8):2233-2235. (in Chinese)
[15] 李新伟,夏秀珍. 基于内容结构图的鲁棒图像哈希[J]. 应用科学学报,2016, 34(6):691-701. Li X W, Xia X Z. Robust image hashing based on content structure diagram[J]. Journal of Applied Sciences, 2016, 34(6):691-701. (in Chinese)
[16] Tang Z, Zhang X, Li X, Zhang S. Robust image hashing with ring partition and invariant vector distance[J]. IEEE Transactions on Information Forensics & Security, 2015, 11(1):200-214.
[17] Ller H, Ller W, Squire D M, Pun T. Performance evaluation in content-based image retrieval:overview and proposals[J]. Pattern Recognition Letters, 2001, 22(5):593-601.

Outlines

/