scispace - formally typeset
Journal ArticleDOI

Robust Image Hashing With Singular Values Of Quaternion SVD

TLDR
A robust image hashing with singular values of quaternion singular value decomposition (QSVD) is proposed, the key contribution is the innovative use of QSVD, which can extract stable and discriminative image features from CIE L*a*b* color space.
Abstract
\n Image hashing is an efficient technique of many multimedia systems, such as image retrieval, image authentication and image copy detection. Classification between robustness and discrimination is one of the most important performances of image hashing. In this paper, we propose a robust image hashing with singular values of quaternion singular value decomposition (QSVD). The key contribution is the innovative use of QSVD, which can extract stable and discriminative image features from CIE L*a*b* color space. In addition, image features of a block are viewed as a point in the Cartesian coordinates and compressed by calculating the Euclidean distance between its point and a reference point. As the Euclidean distance requires smaller storage than the original block features, this technique helps to make a discriminative and compact hash. Experiments with three open image databases are conducted to validate efficiency of our image hashing. The results demonstrate that our image hashing can resist many digital operations and reaches a good discrimination. Receiver operating characteristic curve comparisons illustrate that our image hashing outperforms some state-of-the-art algorithms in classification performance.

read more

Citations
More filters
Journal ArticleDOI

Image encryption algorithm with circle index table scrambling and partition diffusion

TL;DR: The main feature of this algorithm is that the robust chaos-based keystream and encryption process are highly sensitive to the plaintext, which will effectively resist against chosen-plain text and known-plaintext attacks.
Journal ArticleDOI

Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints

TL;DR: A novel perceptual image hashing scheme based on convolutional neural network (CNN) with multiple constraints is proposed, in which the deep hashing network learns the process of features extraction automatically according to the training target and then generates the final hash sequence.
Journal ArticleDOI

Robust and fast image hashing with two-dimensional PCA

TL;DR: A robust and fast image hashing based on two-dimensional (2D) principal component analysis (PCA) and saliency map and classification comparison shows that this hashing is better than some state-of-the-art algorithms.
Journal ArticleDOI

Robust Image Hashing With Isomap and Saliency Map for Copy Detection

TL;DR: Wang et al. as mentioned in this paper proposed a robust image hashing with Isometric Mapping (Isomap) and saliency map for copy detection, which can guarantee robustness of the proposed image hashing.
Journal ArticleDOI

Efficient Hashing Method Using 2D-2D PCA for Image Copy Detection

TL;DR: Wang et al. as mentioned in this paper proposed an efficient hashing method for image copy detection using 2D-2D (two-directional two-dimensional) PCA (Principal Component Analysis).
References
More filters
Journal ArticleDOI

An introduction to ROC analysis

TL;DR: The purpose of this article is to serve as an introduction to ROC graphs and as a guide for using them in research.
Proceedings ArticleDOI

UCID: an uncompressed color image database

TL;DR: A new dataset, UCID (pronounced "use it") - an Uncompressed Colour Image Dataset which tries to bridge the gap between standardised image databases and objective evaluation of image retrieval algorithms that operate in the compressed domain.
Journal ArticleDOI

Quaternions and matrices of quaternions

TL;DR: A brief survey on quaternions and matrices of quaternion is given in this article, where the authors present new proofs for certain known results and discuss the quaternionic analogues of complex matrices.
Proceedings ArticleDOI

A robust content based digital signature for image authentication

TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.
Journal ArticleDOI

Watermarking schemes evaluation

TL;DR: This article has used a duality approach to the watermarking evaluation problem by splitting the evaluation criteria into two (independent) groups: functionality and assurance.
Related Papers (5)