Skip to main content

Image Hashing Based on CS-LBP and DCT for Copy Detection

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11634))

Abstract

In order to improve the accuracy and speed of copy detection, we propose an image hashing algorithm based on local feature and global feature in this paper. Firstly, input image is converted to a normalized image. Then, wavelet decomposition is applied to the preprocessed image to produce approximate image and high-frequency information. Center symmetric local binary pattern (CS-LBP) is applied to approximate image to produce a CS-LBP texture image. The local feature is extracted by dividing blocks and selecting mean, variance, third moment, fourth moment statistics feature in CS-LBP texture image. The global feature is extracted by selecting the discrete cosine transform (DCT) coefficients of high frequency-information. Finally, local features and global features are combined to generate image hashing. Experiment with open images are carried out and the results show that the proposed algorithm is robust and discriminative. The precision rate and the recall rate (P-R) curve comparisons show that our hashing algorithm outperforms some existing hashing algorithms in copy detection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kim, C.: Content-based image copy detection. Sig. Process. Image Commun. 18(3), 169–184 (2003)

    Article  Google Scholar 

  2. Tang, Z., Yang, F., Huang, L., Wei, M.: DCT and DWT based image hashing for copy detection. ICIC Express Lett. 7(11), 2961–2967 (2013)

    Google Scholar 

  3. Tang, Z., Yang, F., Huang, L., Zhang, X.: Robust image hashing with dominant DCT coefficients. Optik-Int. J. Light. Electron Opt. 125(18), 5102–5107 (2014)

    Article  Google Scholar 

  4. Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin P.: Robust image hashing. In: International Conference on Image Processing, vol. 663, pp. 664–666 (2000)

    Google Scholar 

  5. Hsieh, S.L., Chen, C.C., Chen, C.R.: A Novel Approach to Detecting Duplicate Images using Multiple Hash Tables. Kluwer Academic Publishers, Hingham (2015)

    Book  Google Scholar 

  6. Ou, Y.: Rhee, K.H.: A key-dependent secure image hashing scheme by using Radon transform. In: International Symposium on Intelligent Signal Processing and Communication Systems, pp. 595–598 (2009)

    Google Scholar 

  7. Srivastava, M., Siddiqui, J., Ali, M.A.: Robust image hashing based on statistical features for copy detection. In: IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering, pp. 490–495 (2017)

    Google Scholar 

  8. Li, X.-W., Xia, X.Z.: Robust image hashing based on content structure diagram. J. Appl. Sci. 34(6), 691–701 (2016)

    Google Scholar 

  9. Tang, Z., et al.: Robust image hashing via random Gabor filtering and DWT. CMC: Comput. Mater. Contin. 55(2), 331–344 (2018)

    Google Scholar 

  10. Monga, V., Mihcak, M.K.V.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forensics Secur. 2(3), 376–390 (2007)

    Article  Google Scholar 

  11. Tang, Z., Yang, F., Huang, Z., Lao, H.: Image hashing algorithm based on PCA feature distance. J. Guangxi Norm. Univ. (Nat. Sci. Ed.) 34(4), 9–18 (2016)

    Google Scholar 

  12. Ling, H., Cheng, H., Ma, Q., Zou, F., Yan, W.Q.: Efficient image copy detection using multiscale fingerprints. IEEE Multimed. 19(1), 60–69 (2012)

    Article  Google Scholar 

  13. Baber, J., Satoh, S.I., Keatmanee, C., Afzulpurkar, N.: Improving the performance of SIFT and CSLBP for image copy detection. In: International Conference on Telecommunications and Signal Processing (2013)

    Google Scholar 

  14. Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C.N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48–63 (2016)

    Article  Google Scholar 

  15. Wu, Q., Li, Y., Lin, Y., Zhou, R.: Weighted sparse image classification based on low rank representation. CMC: Comput. Mater. Contin. 56(1), 91–105 (2018)

    Google Scholar 

  16. Yan, L., Ling, H., Zou, F., Liu, C.: Iterated local search optimized hashing for image copy detection. Multimed. Tools Appl. 74(21), 9729–9746 (2015)

    Article  Google Scholar 

  17. Liu, J., Ling, H., Yan, L., Ou, X.: Feature fusion based hashing for large scale image copy detection. Int. J. Comput. Intell. Syst. 8(4), 725–734 (2015)

    Article  Google Scholar 

  18. Zhou, Z., Sun, X., Wang, Y., Fu, Z., Shi, Y.-Q.: Combination of SIFT feature and convex region-based global context feature for image copy detection. In: Shi, Y.-Q., Kim, H.J., Pérez-González, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 60–71. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-19321-2_5

    Chapter  Google Scholar 

  19. Lin, S.D., Yang, L.S.O.: An effective content-based copy detection scheme for image authentication. In: International Conference on Machine Learning and Cybernetics, pp. 321–325 (2014)

    Google Scholar 

  20. Heikkilä, M., Pietikäinen, M., Schmid, C.: Description of interest regions with center-symmetric local binary patterns. In: Kalra, P.K., Peleg, S. (eds.) ICVGIP 2006. LNCS, vol. 4338, pp. 58–69. Springer, Heidelberg (2006). https://doi.org/10.1007/11949619_6

    Chapter  Google Scholar 

  21. Tang, Z., Zhang, X., Li, X., Zhang, S.: Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forensics Secur. 11(1), 200–214 (2015)

    Article  Google Scholar 

  22. Zhao, Y., Wang, S., Zhang, X., Yao, H.: Robust hashing for image authentication using Zernike moments and local features. IEEE Trans. Inf. Forensics Secur. 8(1), 55–63 (2013)

    Article  Google Scholar 

  23. Test Image. http://wang.ist.psu.edu/docs/related/. Accessed 21 Mar 2018

  24. Müller, H., Müller, W., Squire, D.M., Marchand-Maillet, S., Pun, T.: Performance evaluation in content-based image retrieval: overview and proposals. Pattern Recogn. Lett. 22(5), 593–601 (2001)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundations of China under Grant (61802250).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shen, Q., Zhao, Y. (2019). Image Hashing Based on CS-LBP and DCT for Copy Detection. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24271-8_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24270-1

  • Online ISBN: 978-3-030-24271-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics