Journal ArticleDOI
Robust Image Hashing With Singular Values Of Quaternion SVD
TLDR
A robust image hashing with singular values of quaternion singular value decomposition (QSVD) is proposed, the key contribution is the innovative use of QSVD, which can extract stable and discriminative image features from CIE L*a*b* color space.Abstract:
\n Image hashing is an efficient technique of many multimedia systems, such as image retrieval, image authentication and image copy detection. Classification between robustness and discrimination is one of the most important performances of image hashing. In this paper, we propose a robust image hashing with singular values of quaternion singular value decomposition (QSVD). The key contribution is the innovative use of QSVD, which can extract stable and discriminative image features from CIE L*a*b* color space. In addition, image features of a block are viewed as a point in the Cartesian coordinates and compressed by calculating the Euclidean distance between its point and a reference point. As the Euclidean distance requires smaller storage than the original block features, this technique helps to make a discriminative and compact hash. Experiments with three open image databases are conducted to validate efficiency of our image hashing. The results demonstrate that our image hashing can resist many digital operations and reaches a good discrimination. Receiver operating characteristic curve comparisons illustrate that our image hashing outperforms some state-of-the-art algorithms in classification performance.read more
Citations
More filters
Journal ArticleDOI
Image encryption algorithm with circle index table scrambling and partition diffusion
TL;DR: The main feature of this algorithm is that the robust chaos-based keystream and encryption process are highly sensitive to the plaintext, which will effectively resist against chosen-plain text and known-plaintext attacks.
Journal ArticleDOI
Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints
TL;DR: A novel perceptual image hashing scheme based on convolutional neural network (CNN) with multiple constraints is proposed, in which the deep hashing network learns the process of features extraction automatically according to the training target and then generates the final hash sequence.
Journal ArticleDOI
Robust and fast image hashing with two-dimensional PCA
TL;DR: A robust and fast image hashing based on two-dimensional (2D) principal component analysis (PCA) and saliency map and classification comparison shows that this hashing is better than some state-of-the-art algorithms.
Journal ArticleDOI
Robust Image Hashing With Isomap and Saliency Map for Copy Detection
TL;DR: Wang et al. as mentioned in this paper proposed a robust image hashing with Isometric Mapping (Isomap) and saliency map for copy detection, which can guarantee robustness of the proposed image hashing.
Journal ArticleDOI
Efficient Hashing Method Using 2D-2D PCA for Image Copy Detection
TL;DR: Wang et al. as mentioned in this paper proposed an efficient hashing method for image copy detection using 2D-2D (two-directional two-dimensional) PCA (Principal Component Analysis).
References
More filters
Journal ArticleDOI
An introduction to ROC analysis
TL;DR: The purpose of this article is to serve as an introduction to ROC graphs and as a guide for using them in research.
Proceedings ArticleDOI
UCID: an uncompressed color image database
Gerald Schaefer,Michal Stich +1 more
TL;DR: A new dataset, UCID (pronounced "use it") - an Uncompressed Colour Image Dataset which tries to bridge the gap between standardised image databases and objective evaluation of image retrieval algorithms that operate in the compressed domain.
Journal ArticleDOI
Quaternions and matrices of quaternions
TL;DR: A brief survey on quaternions and matrices of quaternion is given in this article, where the authors present new proofs for certain known results and discuss the quaternionic analogues of complex matrices.
Proceedings ArticleDOI
A robust content based digital signature for image authentication
Marc Schneider,Shih-Fu Chang +1 more
TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.
Journal ArticleDOI
Watermarking schemes evaluation
TL;DR: This article has used a duality approach to the watermarking evaluation problem by splitting the evaluation criteria into two (independent) groups: functionality and assurance.