DOI QR코드

DOI QR Code

A Probabilistic Dissimilarity Matching for the DFT-Domain Image Hashing

  • Seo, Jin S. (Gangneung-Wonju National University) ;
  • Jo, Myung-Suk (Gangneung-Wonju National University)
  • Received : 2017.02.03
  • Accepted : 2017.03.04
  • Published : 2017.03.31

Abstract

An image hash, a discriminative and robust summary of an image, should be robust against quality-preserving signal processing steps, while being pairwise independent for perceptually different inputs. In order to improve the hash matching performance, this paper proposes a probabilistic dissimilarity matching. Instead of extracting the binary hash from the query image, we compute the probability that the intermediate hash vector of the query image belongs to each quantization bin, which is referred to as soft quantization binning. The probability is used as a weight in comparing the binary hash of the query with that stored in a database. A performance evaluation over sets of image distortions shows that the proposed probabilistic matching method effectively improves the hash matching performance as compared with the conventional Hamming distance.

Keywords

References

  1. T. Kalker, J. Haitsma, and J. Oostveen, "Issues with digital watermarking and perceptual hashing," in Proc. SPIE 4518, Multimedia Systems and Applications IV, 2001.
  2. A. Menezes, P. Oorshot, S. Vanstone, Handbook of Applied Cryptography, CRC press, 1997.
  3. J. Seo, M. Jin, S. Lee, D. Jang, S. Lee, and C. Yoo, "Audio fingerprinting based on normalized spectral subband moments," IEEE Signal Process. Lett., Vol. 13, No. 4, pp. 209-212, Apr. 2006. https://doi.org/10.1109/LSP.2005.863678
  4. J. Fridrich, "Robust bit extraction from images," in Proc. IEEE Conf. on Multimedia Computing and Systems, pp. 536-540, 1999.
  5. R. Venkatesan, S. Koon, M.H. Jakubowski, and P. Moulin, "Robust image hashing," in Proc. IEEE Conf. on Image Processing, pp.664-666, 2000.
  6. J. Seo, J. Haitsma, T. Kalker, C. Yoo, "A robust image fingerprinting system using the Radon transform," Signal Processing: Image Communication, Vol. 19, pp. 325-339, 2004. https://doi.org/10.1016/j.image.2003.12.001
  7. A. Swaminathan, Y. Mao, M. Wu, "Robust and secure image hashing," IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, pp. 215-230, June 2006. https://doi.org/10.1109/TIFS.2006.873601
  8. F. Lefebvre, B. Macq, and J. Legat, "RASH: Radon soft hash algorithm," in Proc. European Signal Processing conference, pp. 299-302, 2002.
  9. D. Wu, X. Zhou, and X. Niu, "A novel image hash algorithm resistant to print-scan," Signal Processing, Vol. 89, No. 12, 2415-2424, Dec. 2009. https://doi.org/10.1016/j.sigpro.2009.05.016
  10. R. Wolfgang, C. Podilchuk, and E. Delp, "Perceptual watermarks for digital images and video," Proc. IEEE, Vol. 87, No.7, pp. 1108-1126, 1999. https://doi.org/10.1109/5.771067
  11. M. Barni, F. Bartolini, V. Cappellini, and A. Piva, "A DCT-domain system for robust image watermarking," Signal Processing, Vol. 66, No. 3, pp. 357-372, 1998. https://doi.org/10.1016/S0165-1684(98)00015-2
  12. Q. Cheng and T. Huang, "Robust optimum detection of transform domain multiplicative watermarks," IEEE Transactions on Signal Processing, Vol. 51, No. 4, pp. 906-924, 2003. https://doi.org/10.1109/TSP.2003.809374
  13. R. Barnett and D. Pearson, "Frequency mode LR attack operator for digitally watermarked images," Electronics Letters, Vol. 34, No. 19, pp. 1837-1839, 1998. https://doi.org/10.1049/el:19981323
  14. S. Pereira, S. Voloshynovskiy, M. Madueno, S. Marchand-Maillet, and T. Pun, "Second generation benchmarking and application oriented evaluation," in Proc. Information Hiding Workshop, pp. 340-353, 2001.