|
|
Content-based image hashing using wave atoms |
Liu Fang(刘芳)a)†, Leung Hon-Yin(梁瀚贤)a), Cheng Lee-Ming(郑利明)a), and Ji Xiao-Yong(季晓勇)b) |
a. Department of Electronic Engineering, City University of Hong Kong, Hong Kong SAR, China;
b. School of Electronic Science and Engineering, Nanjing University, Nanjing 210093, China |
|
|
Abstract It is well known that robustness, fragility, and security are three important criteria of image hashing; however how to build a system that can strongly meet these three criteria is still a challenge. In this paper, a content-based image hashing scheme using wave atoms is proposed, which satisfies the above criteria. Compared with traditional transforms like wavelet transform and discrete cosine transform (DCT), wave atom transform is adopted for the sparser expansion and better characteristics of texture feature extraction which shows better performance in both robustness and fragility. In addition, multi-frequency detection is presented to provide an application-defined trade-off. To ensure the security of the proposed approach and its resistance to a chosen-plaintext attack, a randomized pixel modulation based on the Rényi chaotic map is employed, combining with the nonliner wave atom transform. The experimental results reveal that the proposed scheme is robust against content-preserving manipulations and has a good discriminative capability to malicious tampering.
|
Received: 02 June 2011
Revised: 01 November 2011
Accepted manuscript online:
|
PACS:
|
02.70.-c
|
(Computational techniques; simulations)
|
|
05.45.Gg
|
(Control of chaos, applications of chaos)
|
|
42.30.Va
|
(Image forming and processing)
|
|
43.60.Hj
|
(Time-frequency signal processing, wavelets)
|
|
Corresponding Authors:
Liu Fang, E-mail:f.liu@student.cityu.edu.hk
E-mail: f.liu@student.cityu.edu.hk
|
Cite this article:
Liu Fang(刘芳), Leung Hon-Yin(梁瀚贤), Cheng Lee-Ming(郑利明), and Ji Xiao-Yong(季晓勇) Content-based image hashing using wave atoms 2012 Chin. Phys. B 21 040204
|
[1] |
Schneier B 1996 Applied Cryptography (New York: John Wiley & Sons, Inc.)
|
[2] |
Monga V, Banerjee A and Evans B L 2006 IEEE Transaction on Information Forensics and Security 1 68
|
[3] |
Lamberger M, Pramstaller N, Rechberger C and Rijmen V 2008 IEEE Transaction on Information Theory 54 3647
|
[4] |
Schneider M and Chang S F 1996 Proceeding of IEEE International Conference on Image Processing, September 16-19, 1996, Lausanne, Switzerland, Vol. 3, p. 227
|
[5] |
Venkatesan R, Koon S M, Jakubowski M H and Moulin P 2000 Proceeding of IEEE International Conference Image Processing, September 10-13, 2000, Vancouver, BC, Canada, Vol. 3, p. 664
|
[6] |
Kailasanathan C, Naini R S and Ogunbona P 2001 Proceeding of IEEE-EURASIP Workshop on Nonlinear Signal Image Processing, June 3-6, 2001, Baltimore, MD, USA, doi=10.1.1.15.2556
|
[7] |
Lin C Y and Chang S F 2001 IEEE Transaction on Circuits and Systems for Video Technology 11 153
|
[8] |
Lu C S and Liao H Y M 2003 IEEE Transaction on Multimedia 5 161
|
[9] |
Bhattacharjee S and Kutter M 1998 Proceeding of IEEE International Conference on Image Processing, October 4-7, 1998, Chicago, USA, Vol. 1, p. 435
|
[10] |
Monga V, Vats D and Evans B L 2005 Proceeding of IEEE international Conference on Multimedia and Expo, July 6-8, 2005, Amsterdam, The Netherlands, p. 229
|
[11] |
Monga V and Evans B L 2006 IEEE Transaction on Image Processing 15 3452
|
[12] |
Khelifi F and Jiang J M 2009 IEEE Transaction on Image Processing 19 981
|
[13] |
Fridrich J and Goljan M 2000 Proceeding of IEEE International Conference on Information Technology: Coding and Computing, March 27-29, Las Vegas, USA, p. 178
|
[14] |
Swaminathan A, Mao Y and Wu M 2006 IEEE Transaction on Information Forensics and Security 1 215
|
[15] |
Monga V and Mihcak M K 2007 IEEE Transaction on Information Forensics and Security 2 376
|
[16] |
Demanet L and Ying L 2007 Applied and Computational Harmonic Analysis 23 368
|
[17] |
Wang F L 2010 Chin. Phys. B 19 090505
|
[18] |
Liu S B, Sun J, Xu Z Q and Liu J S 2009 Chin. Phys. B 18 5219
|
[19] |
Mallat S 1999 A Wavelet Tour of Signal Processing 2nd edn. (Orlando/San Diego: Academic Press)
|
[20] |
Antoine J P and Murenzi R 1996 Signal Processing 52 259
|
[21] |
Ahmed F, Siyal M Y and Vali U A 2010 Signal Processing 90 1456
|
[22] |
Addabbo T, Alioto M, Fort A, Pasini A, Rocchi S and Vignoli V 2007 IEEE Transactions on Circuit and Systems I: Regular Papers 54 816
|
[23] |
Guo X C and Hatzinakos D 2007 PCM 4810 755
|
[24] |
Seo J S, Haitsma J, Kalker T and Yoo C D 2004 Signal Processing: Image Communication 19 325
|
No Suggested Reading articles found! |
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
Altmetric
|
blogs
Facebook pages
Wikipedia page
Google+ users
|
Online attention
Altmetric calculates a score based on the online attention an article receives. Each coloured thread in the circle represents a different type of online attention. The number in the centre is the Altmetric score. Social media and mainstream news media are the main sources that calculate the score. Reference managers such as Mendeley are also tracked but do not contribute to the score. Older articles often score higher because they have had more time to get noticed. To account for this, Altmetric has included the context data for other articles of a similar age.
View more on Altmetrics
|
|
|