Please wait a minute...
Chin. Phys. B, 2012, Vol. 21(4): 040204    DOI: 10.1088/1674-1056/21/4/040204
GENERAL Prev   Next  

Content-based image hashing using wave atoms

Liu Fang(刘芳)a)†, Leung Hon-Yin(梁瀚贤)a), Cheng Lee-Ming(郑利明)a), and Ji Xiao-Yong(季晓勇)b)
a. Department of Electronic Engineering, City University of Hong Kong, Hong Kong SAR, China;
b. School of Electronic Science and Engineering, Nanjing University, Nanjing 210093, China
Abstract  It is well known that robustness, fragility, and security are three important criteria of image hashing; however how to build a system that can strongly meet these three criteria is still a challenge. In this paper, a content-based image hashing scheme using wave atoms is proposed, which satisfies the above criteria. Compared with traditional transforms like wavelet transform and discrete cosine transform (DCT), wave atom transform is adopted for the sparser expansion and better characteristics of texture feature extraction which shows better performance in both robustness and fragility. In addition, multi-frequency detection is presented to provide an application-defined trade-off. To ensure the security of the proposed approach and its resistance to a chosen-plaintext attack, a randomized pixel modulation based on the Rényi chaotic map is employed, combining with the nonliner wave atom transform. The experimental results reveal that the proposed scheme is robust against content-preserving manipulations and has a good discriminative capability to malicious tampering.
Keywords:  image hashing      authentication      wave atom transform      chaotic system  
Received:  02 June 2011      Revised:  01 November 2011      Accepted manuscript online: 
PACS:  02.70.-c (Computational techniques; simulations)  
  05.45.Gg (Control of chaos, applications of chaos)  
  42.30.Va (Image forming and processing)  
  43.60.Hj (Time-frequency signal processing, wavelets)  
Corresponding Authors:  Liu Fang, E-mail:f.liu@student.cityu.edu.hk     E-mail:  f.liu@student.cityu.edu.hk

Cite this article: 

Liu Fang(刘芳), Leung Hon-Yin(梁瀚贤), Cheng Lee-Ming(郑利明), and Ji Xiao-Yong(季晓勇) Content-based image hashing using wave atoms 2012 Chin. Phys. B 21 040204

[1] Schneier B 1996 Applied Cryptography (New York: John Wiley & Sons, Inc.)
[2] Monga V, Banerjee A and Evans B L 2006 IEEE Transaction on Information Forensics and Security 1 68
[3] Lamberger M, Pramstaller N, Rechberger C and Rijmen V 2008 IEEE Transaction on Information Theory 54 3647
[4] Schneider M and Chang S F 1996 Proceeding of IEEE International Conference on Image Processing, September 16-19, 1996, Lausanne, Switzerland, Vol. 3, p. 227
[5] Venkatesan R, Koon S M, Jakubowski M H and Moulin P 2000 Proceeding of IEEE International Conference Image Processing, September 10-13, 2000, Vancouver, BC, Canada, Vol. 3, p. 664
[6] Kailasanathan C, Naini R S and Ogunbona P 2001 Proceeding of IEEE-EURASIP Workshop on Nonlinear Signal Image Processing, June 3-6, 2001, Baltimore, MD, USA, doi=10.1.1.15.2556
[7] Lin C Y and Chang S F 2001 IEEE Transaction on Circuits and Systems for Video Technology 11 153
[8] Lu C S and Liao H Y M 2003 IEEE Transaction on Multimedia 5 161
[9] Bhattacharjee S and Kutter M 1998 Proceeding of IEEE International Conference on Image Processing, October 4-7, 1998, Chicago, USA, Vol. 1, p. 435
[10] Monga V, Vats D and Evans B L 2005 Proceeding of IEEE international Conference on Multimedia and Expo, July 6-8, 2005, Amsterdam, The Netherlands, p. 229
[11] Monga V and Evans B L 2006 IEEE Transaction on Image Processing 15 3452
[12] Khelifi F and Jiang J M 2009 IEEE Transaction on Image Processing 19 981
[13] Fridrich J and Goljan M 2000 Proceeding of IEEE International Conference on Information Technology: Coding and Computing, March 27-29, Las Vegas, USA, p. 178
[14] Swaminathan A, Mao Y and Wu M 2006 IEEE Transaction on Information Forensics and Security 1 215
[15] Monga V and Mihcak M K 2007 IEEE Transaction on Information Forensics and Security 2 376
[16] Demanet L and Ying L 2007 Applied and Computational Harmonic Analysis 23 368
[17] Wang F L 2010 Chin. Phys. B 19 090505
[18] Liu S B, Sun J, Xu Z Q and Liu J S 2009 Chin. Phys. B 18 5219
[19] Mallat S 1999 A Wavelet Tour of Signal Processing 2nd edn. (Orlando/San Diego: Academic Press)
[20] Antoine J P and Murenzi R 1996 Signal Processing 52 259
[21] Ahmed F, Siyal M Y and Vali U A 2010 Signal Processing 90 1456
[22] Addabbo T, Alioto M, Fort A, Pasini A, Rocchi S and Vignoli V 2007 IEEE Transactions on Circuit and Systems I: Regular Papers 54 816
[23] Guo X C and Hatzinakos D 2007 PCM 4810 755
[24] Seo J S, Haitsma J, Kalker T and Yoo C D 2004 Signal Processing: Image Communication 19 325
[1] Data encryption based on a 9D complex chaotic system with quaternion for smart grid
Fangfang Zhang(张芳芳), Zhe Huang(黄哲), Lei Kou(寇磊), Yang Li(李扬), Maoyong Cao(曹茂永), and Fengying Ma(马凤英). Chin. Phys. B, 2023, 32(1): 010502.
[2] Exponential sine chaotification model for enhancing chaos and its hardware implementation
Rui Wang(王蕊), Meng-Yang Li(李孟洋), and Hai-Jun Luo(罗海军). Chin. Phys. B, 2022, 31(8): 080508.
[3] The transition from conservative to dissipative flows in class-B laser model with fold-Hopf bifurcation and coexisting attractors
Yue Li(李月), Zengqiang Chen(陈增强), Mingfeng Yuan(袁明峰), and Shijian Cang(仓诗建). Chin. Phys. B, 2022, 31(6): 060503.
[4] Solutions and memory effect of fractional-order chaotic system: A review
Shaobo He(贺少波), Huihai Wang(王会海), and Kehui Sun(孙克辉). Chin. Phys. B, 2022, 31(6): 060501.
[5] Neural-mechanism-driven image block encryption algorithm incorporating a hyperchaotic system and cloud model
Peng-Fei Fang(方鹏飞), Han Liu(刘涵), Cheng-Mao Wu(吴成茂), and Min Liu(刘旻). Chin. Phys. B, 2022, 31(4): 040501.
[6] Color-image encryption scheme based on channel fusion and spherical diffraction
Jun Wang(王君), Yuan-Xi Zhang(张沅熙), Fan Wang(王凡), Ren-Jie Ni(倪仁杰), and Yu-Heng Hu(胡玉衡). Chin. Phys. B, 2022, 31(3): 034205.
[7] Explosive synchronization: From synthetic to real-world networks
Atiyeh Bayani, Sajad Jafari, and Hamed Azarnoush. Chin. Phys. B, 2022, 31(2): 020504.
[8] Acoustic wireless communication based on parameter modulation and complex Lorenz chaotic systems with complex parameters and parametric attractors
Fang-Fang Zhang(张芳芳), Rui Gao(高瑞), and Jian Liu(刘坚). Chin. Phys. B, 2021, 30(8): 080503.
[9] Complex network perspective on modelling chaotic systems via machine learning
Tong-Feng Weng(翁同峰), Xin-Xin Cao(曹欣欣), and Hui-Jie Yang(杨会杰). Chin. Phys. B, 2021, 30(6): 060506.
[10] Energy behavior of Boris algorithm
Abdullah Zafar and Majid Khan. Chin. Phys. B, 2021, 30(5): 055203.
[11] Dynamical analysis, circuit realization, and application in pseudorandom number generators of a fractional-order laser chaotic system
Chenguang Ma(马晨光), Santo Banerjee, Li Xiong(熊丽), Tianming Liu(刘天明), Xintong Han(韩昕彤), and Jun Mou(牟俊). Chin. Phys. B, 2021, 30(12): 120504.
[12] Cascade discrete memristive maps for enhancing chaos
Fang Yuan(袁方), Cheng-Jun Bai(柏承君), and Yu-Xia Li(李玉霞). Chin. Phys. B, 2021, 30(12): 120514.
[13] Design and multistability analysis of five-value memristor-based chaotic system with hidden attractors
Li-Lian Huang(黄丽莲), Shuai Liu(刘帅), Jian-Hong Xiang(项建弘), and Lin-Yu Wang(王霖郁). Chin. Phys. B, 2021, 30(10): 100506.
[14] Adaptive synchronization of chaotic systems with less measurement and actuation
Shun-Jie Li(李顺杰), Ya-Wen Wu(吴雅文), and Gang Zheng(郑刚). Chin. Phys. B, 2021, 30(10): 100503.
[15] A novel method of constructing high-dimensional digital chaotic systems on finite-state automata
Jun Zheng(郑俊), Han-Ping Hu(胡汉平). Chin. Phys. B, 2020, 29(9): 090502.
No Suggested Reading articles found!