Skip to main content

Perceptual Image Hashing with Histogram of Color Vector Angles

  • Conference paper
Active Media Technology (AMT 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7669))

Included in the following conference series:

Abstract

Image hashing is an emerging technology for the need of, such as image authentication, digital watermarking, image copy detection and image indexing in multimedia processing, which derives a content-based compact representation, called image hash, from an input image. In this paper we study a robust image hashing algorithm with histogram of color vector angles. Specifically, the input image is first converted to a normalized image by interpolation and low-pass filtering. Color vector angles are then calculated. Thirdly, the histogram is extracted for those angles in the inscribed circle of the normalized image. Finally, the histogram is compressed to form a compact hash. We conduct experiments for evaluating the proposed hashing, and show that the proposed hashing is robust against normal digital operations, such as JPEG compression, watermarking embedding, scaling, rotation, brightness adjustment, contrast adjustment, gamma correction, and Gaussian low-pass filtering. Receiver operating characteristics (ROC) curve comparisons indicate that our hashing performs much better than three representative methods in classification between perceptual robustness and discriminative capability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Qin, C., Chang, C.C., Chen, P.Y.: Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Processing 92, 1137–1150 (2012)

    Article  Google Scholar 

  2. Venkatesan, R., Koon, S.-M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: 7th IEEE International Conference on Image Processing, pp. 664–666. IEEE Press, New York (2000)

    Google Scholar 

  3. Lin, C.Y., Chang, S.F.: A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits System and Video Technology 11, 153–168 (2001)

    Article  Google Scholar 

  4. Lefebvre, F., Macq, B., Legat, J.-D.: RASH: Radon soft hash algorithm. In: 11th European Signal Processing Conference, pp. 299–302 (2002)

    Google Scholar 

  5. Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1, 215–230 (2006)

    Article  Google Scholar 

  6. Kozat, S.S., Venkatesan, R., Mihcak, M.K.: Robust perceptual image hashing via matrix invariants. In: 11th IEEE International Conference on Image Processing, pp. 3443–3446. IEEE Press, New York (2004)

    Google Scholar 

  7. Monga, V., Mihcak, M.K.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Transactions on Information Forensics and Security 2, 376–390 (2007)

    Article  Google Scholar 

  8. Ou, Y., Rhee, K.H.: A key-dependent secure image hashing scheme by using Radon transform. In: IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 595–598. IEEE Press, New York (2009)

    Google Scholar 

  9. Tang, Z., Wang, S., Zhang, X., Wei, W.: Structural feature-based image hashing and similarity metric for tampering detection. Fundamenta Informaticae 106, 75–91 (2011)

    MathSciNet  Google Scholar 

  10. Dony, R.D., Wesolkowski, S.: Edge detection on color images using RGB vector angles. In: IEEE Canadian Conference on Electrical and Computer Engineering, vol. 2, pp. 687–692. IEEE Press, New York (1999)

    Google Scholar 

  11. Kim, N.W., Kim, T.Y., Choi, J.S.: Edge-Based Spatial Descriptor for Content-Based Image Retrieval. In: Leow, W.-K., Lew, M., Chua, T.-S., Ma, W.-Y., Chaisorn, L., Bakker, E.M. (eds.) CIVR 2005. LNCS, vol. 3568, pp. 454–464. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Processing Magazine 17, 58–64 (2000)

    Article  Google Scholar 

  13. Ground Truth Database, http://www.cs.washington.edu/research/imagedatabase/groundtruth/

  14. Fawcett, T.: An introduction to ROC analysis. Pattern Recognition Letters 27, 861–874 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tang, Z., Dai, Y., Zhang, X., Zhang, S. (2012). Perceptual Image Hashing with Histogram of Color Vector Angles. In: Huang, R., Ghorbani, A.A., Pasi, G., Yamaguchi, T., Yen, N.Y., Jin, B. (eds) Active Media Technology. AMT 2012. Lecture Notes in Computer Science, vol 7669. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35236-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35236-2_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35235-5

  • Online ISBN: 978-3-642-35236-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics