Skip to main content
Log in

PIH-mSCM: a modified spiking cortical model for perceptual image hashing and its application to copy detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

For one of the most crucial copyright protection of multimedia content, copy image detection necessitates feature extraction and feature matching. However, matching features necessitate extra computation and storage time, which limits its flexibility. Recent research shows the efficiency of perceptual image hashing in the said case. Consequently, we propose a system that uses the spiking cortical model (SCM) as its foundation and modifies it to create a modified SCM (mSCM) to construct the output time-series waveform. The model is iterated to produce a stable feature vector, which is then used to generate hashes. Excellent resistance against geometric distortions and improved discrimination are provided by the SCM feature vector. Additionally, illustrative experimental findings demonstrate the better stability, resilience, and discrimination of our approach, which enables better copy detection than the state-of-the-art techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data Availability

The datasets used to support the findings of this study are available from the public repositories mentioned in the manuscript.

References

  1. Aggarwal AK (2022) Learning texture features from glcm for classification of brain tumor mri images using random forest classifier. Transactions on Signal Processing 18:60–63

    Article  Google Scholar 

  2. Aggarwal AK, Jaidka P (2022) Segmentation of crop images for crop yield prediction. International Journal of Biology and Biomedicine 7

  3. Arora K, Aggarwal AK (2018) Approaches for image database retrieval based on color, texture, and shape features. In: Handbook of research on advanced concepts in real-time image and video processing. IGI Global, pp 28–50

  4. Dataset CEI. https://web.archive.org/web/20210114012713/https://homepages.cae.wisc.edu/ ece533/images/. Accessed 2021 June

  5. Fridrich J (2000) Visual hash for oblivious watermarking. In: Security and watermarking of multimedia contents II, international society for optics and photonics, pp 286–294

  6. Gharde ND, Thounaojam DM, Soni B, et al (2018) Robust perceptual image hashing using fuzzy color histogram. Multimedia Tools and Applications 77(23):30,815–30,840

  7. Glumov N, Mitekin V (2011) A new semi-fragile watermarking algorithm for image authentication and information hiding. Computer Optics 35(2):262–267

    Google Scholar 

  8. Hsiao JH, Chen CS, Chien LF et al (2007) A new approach to image copy detection based on extended feature sets. IEEE Transactions on Image Processing 16(8):2069–2079

    Article  MathSciNet  Google Scholar 

  9. INRIA. https://lear.inrialpes.fr/ jegou/data.php#copydays/. Accessed 2022 June

  10. Jégou H, Perronnin F, Douze M et al (2011) Aggregating local image descriptors into compact codes. IEEE Transactions on Pattern Analysis and Machine Intelligence 34(9):1704–1716

    Article  Google Scholar 

  11. Joly A, Buisson O, Frelicot C (2007) Content-based copy retrieval using distortion-based probabilistic similarity search. IEEE Transactions on Multimedia 9(2):293–306

    Article  Google Scholar 

  12. Karsh RK, Laskar R, Richhariya BB (2016) Robust image hashing using ring partition-pgnmf and local features. SpringerPlus 5(1):1–20

    Article  Google Scholar 

  13. Karsh RK, Laskar RH et al (2017) (2017) Robust image hashing through dwt-svd and spectral residual method. EURASIP Journal on Image and Video Processing 1:1–17

    Google Scholar 

  14. Ke Y, Sukthankar R, Huston L, et al (2004) Efficient near-duplicate detection and sub-image retrieval. In: ACM multimedia, Citeseer, p 5

  15. Khan MF, Monir SM, Naseem I (2021) Robust image hashing based on structural and perceptual features for authentication of color images. Turkish Journal of Electrical Engineering & Computer Sciences 29(2):648–662

    Article  Google Scholar 

  16. Kim C (2003) Content-based image copy detection. Signal Processing: Image Communication 18(3):169–184

    Google Scholar 

  17. Kumari T, Guleria V, Syal P, et al (2021) A feature cum intensity based ssim optimised hybrid image registration technique. In: 2021 International conference on computing, communication and green engineering (CCGE), IEEE, pp 1–8

  18. Lei Y, Wang Y, Huang J (2011) Robust image hash in radon transform domain for authentication. Signal Processing: Image Communication 26(6):280–288

    Google Scholar 

  19. Ling H, Yan L, Zou F et al (2013) Fast image copy detection approach based on local fingerprint defined visual words. Signal Process 93(8):2328–2338

    Article  Google Scholar 

  20. Ma B, Shi YQ (2016) A reversible data hiding scheme based on code division multiplexing. IEEE Transactions on Information Forensics and Security 11(9):1914–1927

    Article  Google Scholar 

  21. Ma Y, Wang Z, Wu C (2006) Feature extraction from noisy image using pcnn. In: 2006 IEEE international conference on information acquisition, IEEE, pp 808–813

  22. Maini D, Aggarwal AK (2018) Camera position estimation using 2d image dataset. Int J Innov Eng Technol 10:199–203

    Google Scholar 

  23. Olmos A, Kingdom FA (2004) A biologically inspired algorithm for the recovery of shading and reflectance images. Perception 33(12):1463–1473

    Article  Google Scholar 

  24. Patil V, Sarode TK (2019) Image hashing using dwt-cslbp. JCP 14(3):210–222

    Google Scholar 

  25. Paul M, Karsh RK, Talukdar FA (2019) Image hashing based on shape context and speeded up robust features (surf). In: 2019 International conference on automation, computational and technology management (ICACTM), IEEE, pp 464–468

  26. Petitcolas F. https://www.petitcolas.net/watermarking/image_database/. Accessed 2021 June

  27. Roy M, Thounaojam DM, Pal S (2022) Perceptual hashing scheme using kaze feature descriptors for combinatorial manipulations. Multimedia Tools and Applications pp 1–29

  28. Shapiro LG (Accessed: 2022 June). https://imagedatabase.cs.washington.edu/groundtruth/

  29. Singh KM, Neelima A, Tuithung T et al (2019) Robust perceptual image hashing using sift and svd. Current Science 117(8):1340

    Article  Google Scholar 

  30. Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hashing. IEEE Transactions on Information Forensics and security 1(2):215–230

    Article  Google Scholar 

  31. Swetha CSLR, Divya Sri C, Bharathi B (2020) Perceptual image hashing using surf for tampered image detection. In: International conference on emerging trends and advances in electrical engineering and renewable energy. Springer, pp 453–461

  32. Tang Z, Wang S, Zhang X et al (2011) Lexicographical framework for image hashing with implementation based on dct and nmf. Multimedia Tools and Applications 52(2):325–345

    Article  Google Scholar 

  33. Tang Z, Yang F, Huang L et al (2014) Robust image hashing with dominant dct coefficients. Optik 125(18):5102–5107

    Article  Google Scholar 

  34. Tang Z, Zhang X, Li X et al (2015) Robust image hashing with ring partition and invariant vector distance. IEEE Transactions on Information Forensics and Security 11(1):200–214

    Article  Google Scholar 

  35. Tang Z, Huang L, Zhang X et al (2016) Robust image hashing based on color vector angle and canny operator. AEU-International Journal of Electronics and Communications 70(6):833–841

    Google Scholar 

  36. Tang Z, Huang Z, Yao H et al (2018) Perceptual image hashing with weighted dwt features for reduced-reference image quality assessment. The Computer Journal 61(11):1695–1709

    Article  Google Scholar 

  37. Thyagharajan K, Kalaiarasi G (2021) A review on near-duplicate detection of images using computer vision techniques. Archives of Computational Methods in Engineering 28:897–916

    Article  MathSciNet  Google Scholar 

  38. Venkatesan R, Koon SM, Jakubowski MH, et al (2000) Robust image hashing. In: Proceedings 2000 international conference on image processing (Cat. No. 00CH37101), IEEE, pp 664–666

  39. Wang C, Wang X, Zhang C et al (2017) Geometric correction based color image watermarking using fuzzy least squares support vector machine and bessel k form distribution. Signal Process 134:197–208

    Article  Google Scholar 

  40. Wang JZ, Li J, Wiederhold G (2001) Simplicity: Semantics-sensitive integrated matching for picture libraries. IEEE Transactions on Pattern Analysis and Machine Intelligence 23(9):947–963

    Article  Google Scholar 

  41. Wang SH, Lin YP (2004) Wavelet tree quantization for copyright protection watermarking. IEEE Transactions on Image Processing 13(2):154–165

    Article  Google Scholar 

  42. Weber AG (2018) The usc-sipi image database version 6. USC-SIPI Report 432:1–24

    Google Scholar 

  43. Xiao C, Wang W, Lin X et al (2011) Efficient similarity joins for near-duplicate detection. ACM Transactions on Database Systems (TODS) 36(3):1–41

    Article  Google Scholar 

  44. Xue M, Yuan C, Liu Z, et al (2019) Ssl: A novel image hashing technique using sift keypoints with saliency detection and lbp feature extraction against combinatorial manipulations. Security and Communication Networks 2019

  45. Zhan K, Zhang H, Ma Y (2009) New spiking cortical model for invariant texture retrieval and image processing. IEEE Transactions on Neural Networks 20(12):1980–1986

    Article  Google Scholar 

  46. Zhou G, Tian X, Zhou A (2022) Image copy-move forgery passive detection based on improved pcnn and self-selected sub-images. Frontiers of Computer Science 16(4):1–16

    Article  Google Scholar 

  47. Zhou Z, Yang CN, Chen B et al (2016) Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Transactions on Information and Systems 99(6):1531–1540

    Article  Google Scholar 

Download references

Funding

This study has not received any funding

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Moumita Roy.

Ethics declarations

Compliance with Ethical Standards

This study does not require any research involving human or animal participation.

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Dalton Meitei Thounaojam and Shyamosree Pal are contributed equally to this work.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Roy, M., Thounaojam, D.M. & Pal, S. PIH-mSCM: a modified spiking cortical model for perceptual image hashing and its application to copy detection. Multimed Tools Appl 83, 38291–38312 (2024). https://doi.org/10.1007/s11042-023-16753-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16753-4

Keywords

Navigation