Abstract
In order to improve the accuracy and speed of copy detection, we propose an image hashing algorithm based on local feature and global feature in this paper. Firstly, input image is converted to a normalized image. Then, wavelet decomposition is applied to the preprocessed image to produce approximate image and high-frequency information. Center symmetric local binary pattern (CS-LBP) is applied to approximate image to produce a CS-LBP texture image. The local feature is extracted by dividing blocks and selecting mean, variance, third moment, fourth moment statistics feature in CS-LBP texture image. The global feature is extracted by selecting the discrete cosine transform (DCT) coefficients of high frequency-information. Finally, local features and global features are combined to generate image hashing. Experiment with open images are carried out and the results show that the proposed algorithm is robust and discriminative. The precision rate and the recall rate (P-R) curve comparisons show that our hashing algorithm outperforms some existing hashing algorithms in copy detection.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kim, C.: Content-based image copy detection. Sig. Process. Image Commun. 18(3), 169–184 (2003)
Tang, Z., Yang, F., Huang, L., Wei, M.: DCT and DWT based image hashing for copy detection. ICIC Express Lett. 7(11), 2961–2967 (2013)
Tang, Z., Yang, F., Huang, L., Zhang, X.: Robust image hashing with dominant DCT coefficients. Optik-Int. J. Light. Electron Opt. 125(18), 5102–5107 (2014)
Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin P.: Robust image hashing. In: International Conference on Image Processing, vol. 663, pp. 664–666 (2000)
Hsieh, S.L., Chen, C.C., Chen, C.R.: A Novel Approach to Detecting Duplicate Images using Multiple Hash Tables. Kluwer Academic Publishers, Hingham (2015)
Ou, Y.: Rhee, K.H.: A key-dependent secure image hashing scheme by using Radon transform. In: International Symposium on Intelligent Signal Processing and Communication Systems, pp. 595–598 (2009)
Srivastava, M., Siddiqui, J., Ali, M.A.: Robust image hashing based on statistical features for copy detection. In: IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering, pp. 490–495 (2017)
Li, X.-W., Xia, X.Z.: Robust image hashing based on content structure diagram. J. Appl. Sci. 34(6), 691–701 (2016)
Tang, Z., et al.: Robust image hashing via random Gabor filtering and DWT. CMC: Comput. Mater. Contin. 55(2), 331–344 (2018)
Monga, V., Mihcak, M.K.V.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forensics Secur. 2(3), 376–390 (2007)
Tang, Z., Yang, F., Huang, Z., Lao, H.: Image hashing algorithm based on PCA feature distance. J. Guangxi Norm. Univ. (Nat. Sci. Ed.) 34(4), 9–18 (2016)
Ling, H., Cheng, H., Ma, Q., Zou, F., Yan, W.Q.: Efficient image copy detection using multiscale fingerprints. IEEE Multimed. 19(1), 60–69 (2012)
Baber, J., Satoh, S.I., Keatmanee, C., Afzulpurkar, N.: Improving the performance of SIFT and CSLBP for image copy detection. In: International Conference on Telecommunications and Signal Processing (2013)
Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C.N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12(1), 48–63 (2016)
Wu, Q., Li, Y., Lin, Y., Zhou, R.: Weighted sparse image classification based on low rank representation. CMC: Comput. Mater. Contin. 56(1), 91–105 (2018)
Yan, L., Ling, H., Zou, F., Liu, C.: Iterated local search optimized hashing for image copy detection. Multimed. Tools Appl. 74(21), 9729–9746 (2015)
Liu, J., Ling, H., Yan, L., Ou, X.: Feature fusion based hashing for large scale image copy detection. Int. J. Comput. Intell. Syst. 8(4), 725–734 (2015)
Zhou, Z., Sun, X., Wang, Y., Fu, Z., Shi, Y.-Q.: Combination of SIFT feature and convex region-based global context feature for image copy detection. In: Shi, Y.-Q., Kim, H.J., Pérez-González, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 60–71. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-19321-2_5
Lin, S.D., Yang, L.S.O.: An effective content-based copy detection scheme for image authentication. In: International Conference on Machine Learning and Cybernetics, pp. 321–325 (2014)
Heikkilä, M., Pietikäinen, M., Schmid, C.: Description of interest regions with center-symmetric local binary patterns. In: Kalra, P.K., Peleg, S. (eds.) ICVGIP 2006. LNCS, vol. 4338, pp. 58–69. Springer, Heidelberg (2006). https://doi.org/10.1007/11949619_6
Tang, Z., Zhang, X., Li, X., Zhang, S.: Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forensics Secur. 11(1), 200–214 (2015)
Zhao, Y., Wang, S., Zhang, X., Yao, H.: Robust hashing for image authentication using Zernike moments and local features. IEEE Trans. Inf. Forensics Secur. 8(1), 55–63 (2013)
Test Image. http://wang.ist.psu.edu/docs/related/. Accessed 21 Mar 2018
Müller, H., Müller, W., Squire, D.M., Marchand-Maillet, S., Pun, T.: Performance evaluation in content-based image retrieval: overview and proposals. Pattern Recogn. Lett. 22(5), 593–601 (2001)
Acknowledgements
This work was supported by National Natural Science Foundations of China under Grant (61802250).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Shen, Q., Zhao, Y. (2019). Image Hashing Based on CS-LBP and DCT for Copy Detection. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_41
Download citation
DOI: https://doi.org/10.1007/978-3-030-24271-8_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24270-1
Online ISBN: 978-3-030-24271-8
eBook Packages: Computer ScienceComputer Science (R0)