Skip to main content

Advertisement

Log in

Image perceptual hashing for content authentication based on Watson’s visual model and LLE

  • Original Research Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Image perceptual hashing has been widely used in image content authentication. In order to extract hashing sequences that are more consistent with the subjective feeling of human’s eyes, better express the nonlinear relationship and internal structure of the original image, and more effectively distinguish the copy image from similar images, an image hashing algorithm is proposed based on Watson’s Visual Model and LLE for the content-based image authentication. First, images are prepossessed to decrease the effects of noise, interpolation and different image sizes. Then weights of DCT co-efficients of non-overlapping image blocks are adjusted by Watson’s Visual Model, and the Hu invariant moment of each image block is combined to generate an intermediate feature matrix, which is scrambled by chaotic encryption. Third, LLE is performed on the intermediate feature matrix to generate a compact hash. Finally, the compact hash is encrypted again with random numbers and quantified into 0 and 1 sequences to attain the final hash. Experimental results illustrate that when the threshold T = 0.20, the true positive rate for similar images stands at 0.9994, while the false positive rate of different images is merely 0.0017, with the total error rate reaching the least value (0.0023). Furthermore, the AUC value of the proposed algorithm is 0.999995, which is higher than that of the comparison algorithms, indicating that the algorithm has better performance than other state-of-the-art algorithms in terms of various content-preserving attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability statement

Research data are not shared.

References

  1. Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inform. Foren. Secur. 10(3), 507–518 (2014)

    Google Scholar 

  2. Zhou, Z., Wu, Q.M.J., Wan, S., Sun, W., Sun, X.: Integrating SIFT and CNN feature matching for partial-duplicate image detection. IEEE Trans. Emerg. Top. Comput. Intell. (2020). https://doi.org/10.1109/TETCI.2019.2909936

    Article  Google Scholar 

  3. Pun, C.M., Yan, C.P., Yuan, X.C.: Robust image hashing using progressive feature selection for tampering detection. Multimed. Tools Appl. 77(10), 11609–11633 (2018)

    Article  Google Scholar 

  4. Wang, X., Zhou, X., Zhang, Q., Xu, B., Xue, J.: Image alignment based perceptual image hash for content authentication. Signal Proces. Image Commun. 80, 115642 (2019)

    Article  Google Scholar 

  5. Du, L., Ho, A.T., Cong, R.: Perceptual hashing for image authentication: a survey. Signal Proces. Image Commun. 81, 115713 (2019)

    Article  Google Scholar 

  6. Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), pp. 227−230. IEEE, Piscataway (1996)

  7. Tang, Z., Yang, F., Huang, L., Zhang, X.Q.: Robust image hashing with dominant DCT coefficients. Optik-Int. J. Light Electron Opt. 125(18), 5102–5107 (2014)

    Article  Google Scholar 

  8. Tang, Z., Huang, Z., Yao, Z.H., et al.: Perceptual image hashing with weighted DWT features for reduced-reference image quality assessment. Comput. J. 61(11), 1695–1709 (2018)

    Article  Google Scholar 

  9. Abdullahi, S.M., Wang, H., Li, T.: Fractal coding-based robust and alignment-free fingerprint image hashing. IEEE Trans. Inf. Forens. Secur. 15, 2587–2601 (2020)

    Article  Google Scholar 

  10. Lv, X., Wang, Z.J.: Perceptual image hashing based on shape contexts and local feature points. IEEE Trans. Inform. Foren. Secur. 17(3), 1081–1093 (2012)

    Article  Google Scholar 

  11. Paul, M., Karsh, R.K., Ahmed Talukdar, F.: Image hashing based on shape context and speeded up robust features. In: 2019 International Conference on Automation, Computational and Technology Management (ICACTM), pp. 464–468 (2019)

  12. Singh, S.P., Bhatnagar, G., Singh, A.K.: A new robust reference image hashing system. IEEE Trans. Depend. Secure Comput. (2021). https://doi.org/10.1109/TDSC.2021.3050435

    Article  Google Scholar 

  13. Ouyang, J., Wen, X., Liu, J., Chen, J.: Robust hashing based on quaternion Zernike moments for image authentication. ACM Trans. Multimed. Comput. Commun. Appl. 12(4), 1–13 (2016)

    Article  Google Scholar 

  14. Huang, Z., Liu, S.: Perceptual hashing with visual content understanding for reduced-reference screen content image quality assessment. IEEE Trans. Circ. Syst. Video Technol. (2020). https://doi.org/10.1109/TCSVT.2020.3027001

    Article  Google Scholar 

  15. Su, Z., Yao, L., Mei, J., Zhou, L., Li, W.: Learning to hash for personalized image authentication. IEEE Trans. Circ. Syst. Video Technol. (2020). https://doi.org/10.1109/TCSVT.2020.3002146

    Article  Google Scholar 

  16. Tang, Z., Yu, M., Yao, H., Zhang, H., Yu, C., Zhang, X.Q.: Robust image hashing with singular values of quaternion SVD. Comput. J. (2019). https://doi.org/10.1093/comjnl/bxz127

    Article  Google Scholar 

  17. Tang, Z., Zhang, X., Zhang, S.: Robust perceptual image hashing based on ring partition and NMF. IEEE Trans. Knowl. Data Eng. 26(3), 711–724 (2014)

    Article  Google Scholar 

  18. Tang, Z., Lao, H., Zhang, X.Q., Liu, K.: Robust image hashing via DCT and LLE. Comput. Secur. 62, 133–148 (2016)

    Article  Google Scholar 

  19. Sun, R., Yan, X., Ding, Z.: Robust image hashing using locally linear embedding. In: Proc. of the 2011 International Conference on Computer Science and Service System (CSSS), pp. 715–718 (2011)

  20. Liang, X., Tang, Z., Xie, X., Wu, J., Zhang, X.: Robust and fast image hashing with two-dimensional PCA. Multimed. Syst. 27(3), 389–401 (2020)

    Article  Google Scholar 

  21. Lei, Y., Wang, Y., Huang, J.: Robust image hash in Radon transform domain for authentication. Signal Process. Image Commun. 26(6), 280–288 (2011)

    Article  Google Scholar 

  22. Tang, Z., Huang, L., Yang, F., Zhang, X.: Robust image hashing based on fan-beam transform. ICIC Express Lett. 8(8), 2365–2372 (2014)

    Google Scholar 

  23. Li, Y., Lu, Z., Zhu, C.E., Niu, X.: Robust image hashing based on random gabor filtering and dithered lattice vector quantization. IEEE Trans. Image Process 21(4), 1963–1980 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  24. Huang, Z., Liu, S.: Perceptual image hashing with texture and invariant vector distance for copy detection. IEEE Trans. Multimedia 23, 1516–1529 (2020)

    Article  Google Scholar 

  25. Liu, S., Huang, Z.: Efficient image hashing with geometric invariant vector distance for copy detection. ACM Trans. Multimed. Comput. Commun. Appl. 4, 1–22 (2019)

    Google Scholar 

  26. Tang, Z., Li, X., Zhang, X., Dai, Y.: Image hashing with color angle. Neurocomputing 308, 147–158 (2018)

    Article  Google Scholar 

  27. Huang, C., Zhou, X., Hu, J., Zhou, Q.: SAR image noise suppression of BEMD by the kernel principle component analysis. IET Image Proc. 15(1), 155–165 (2021)

    Article  Google Scholar 

  28. Chou, C.-H., Li, Y.-C.: A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile [J]. IEEE Trans. Circ. Syst. Video Technol. 5(6), 467–476 (1995)

    Article  Google Scholar 

  29. Qin, C., Liu, E., Feng, G., Zhang, X.: Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints. IEEE Trans. Circ. Syst. Video Technol. 31(11), 4523–4537 (2021)

    Article  Google Scholar 

  30. Wang, X., Pang, K., Zhou, X., Zhou, Y., Li, L., Xue, J.: A visual model-based perceptual image hash for content authentication. IEEE Trans. Inf. Foren. Secur. 10(7), 1336–1349 (2015)

    Article  Google Scholar 

  31. Tang, Z., Zhang, H., Pun, C.-M., Mengzhu, Yu., Chunqiang, Yu., Zhang, X.: Robust image hashing with visual attention model and invariant moments. IET Image Proc. 14(5), 901–908 (2020)

    Article  Google Scholar 

  32. Watson, A.B.: DCT quantization matrices visually optimized for individual images. Proc. SPIE. 11(11), 202–216 (1993)

    Article  Google Scholar 

  33. Roweis, S.T., Saul, L.K.: Nonlinear dimensionality reduction by locally linear embedding. Science 290, 2323–2360 (2000)

    Article  Google Scholar 

  34. USC-SIPI Image Database. Retrieved from: Available: http://sipi.usc.edu/database/. Accessed December 2020

  35. Schaefer, G., Stich, M.: UCID. AN uncompressed colour image database. Proc. SPIE 5307, 472–480 (2004)

    Article  Google Scholar 

  36. Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Process. Mag. 17(5), 58–64 (2000)

    Article  Google Scholar 

  37. Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861–874 (2016)

    Article  Google Scholar 

  38. Huang, X., Liu X., Wang, G., Su, M.: A robust image hashing with enhanced randomness by using random walk on zigzag blocking. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 14–18. IEEE, Piscataway (2016)

  39. Qin, C., Sun, M., Chang, C.-C.: Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process. 142(Jan), 194–205 (2017)

    Google Scholar 

  40. Chen, Z., Sun, S.K.: A Zernike moment phase-based descriptor for local image representation and matching [J]. IEEE Trans. Image Process. 19(1), 205–219 (2010)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by the Anhui Provincial Key Research and Development Plan under Grant 201904a05020091, the Provincial Natural Science Research Program of Higher Education Institutions of Anhui province under Grant KJ2021A1030 and the Key Scientific Research Projects of Chaohu University under Grant XLZ-202108.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qilin Wu.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xing, H., Che, H., Wu, Q. et al. Image perceptual hashing for content authentication based on Watson’s visual model and LLE. J Real-Time Image Proc 20, 7 (2023). https://doi.org/10.1007/s11554-023-01269-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11554-023-01269-9

Keywords

Navigation