Abstract
Image perceptual hashing has been widely used in image content authentication. In order to extract hashing sequences that are more consistent with the subjective feeling of human’s eyes, better express the nonlinear relationship and internal structure of the original image, and more effectively distinguish the copy image from similar images, an image hashing algorithm is proposed based on Watson’s Visual Model and LLE for the content-based image authentication. First, images are prepossessed to decrease the effects of noise, interpolation and different image sizes. Then weights of DCT co-efficients of non-overlapping image blocks are adjusted by Watson’s Visual Model, and the Hu invariant moment of each image block is combined to generate an intermediate feature matrix, which is scrambled by chaotic encryption. Third, LLE is performed on the intermediate feature matrix to generate a compact hash. Finally, the compact hash is encrypted again with random numbers and quantified into 0 and 1 sequences to attain the final hash. Experimental results illustrate that when the threshold T = 0.20, the true positive rate for similar images stands at 0.9994, while the false positive rate of different images is merely 0.0017, with the total error rate reaching the least value (0.0023). Furthermore, the AUC value of the proposed algorithm is 0.999995, which is higher than that of the comparison algorithms, indicating that the algorithm has better performance than other state-of-the-art algorithms in terms of various content-preserving attacks.
Similar content being viewed by others
Data availability statement
Research data are not shared.
References
Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inform. Foren. Secur. 10(3), 507–518 (2014)
Zhou, Z., Wu, Q.M.J., Wan, S., Sun, W., Sun, X.: Integrating SIFT and CNN feature matching for partial-duplicate image detection. IEEE Trans. Emerg. Top. Comput. Intell. (2020). https://doi.org/10.1109/TETCI.2019.2909936
Pun, C.M., Yan, C.P., Yuan, X.C.: Robust image hashing using progressive feature selection for tampering detection. Multimed. Tools Appl. 77(10), 11609–11633 (2018)
Wang, X., Zhou, X., Zhang, Q., Xu, B., Xue, J.: Image alignment based perceptual image hash for content authentication. Signal Proces. Image Commun. 80, 115642 (2019)
Du, L., Ho, A.T., Cong, R.: Perceptual hashing for image authentication: a survey. Signal Proces. Image Commun. 81, 115713 (2019)
Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), pp. 227−230. IEEE, Piscataway (1996)
Tang, Z., Yang, F., Huang, L., Zhang, X.Q.: Robust image hashing with dominant DCT coefficients. Optik-Int. J. Light Electron Opt. 125(18), 5102–5107 (2014)
Tang, Z., Huang, Z., Yao, Z.H., et al.: Perceptual image hashing with weighted DWT features for reduced-reference image quality assessment. Comput. J. 61(11), 1695–1709 (2018)
Abdullahi, S.M., Wang, H., Li, T.: Fractal coding-based robust and alignment-free fingerprint image hashing. IEEE Trans. Inf. Forens. Secur. 15, 2587–2601 (2020)
Lv, X., Wang, Z.J.: Perceptual image hashing based on shape contexts and local feature points. IEEE Trans. Inform. Foren. Secur. 17(3), 1081–1093 (2012)
Paul, M., Karsh, R.K., Ahmed Talukdar, F.: Image hashing based on shape context and speeded up robust features. In: 2019 International Conference on Automation, Computational and Technology Management (ICACTM), pp. 464–468 (2019)
Singh, S.P., Bhatnagar, G., Singh, A.K.: A new robust reference image hashing system. IEEE Trans. Depend. Secure Comput. (2021). https://doi.org/10.1109/TDSC.2021.3050435
Ouyang, J., Wen, X., Liu, J., Chen, J.: Robust hashing based on quaternion Zernike moments for image authentication. ACM Trans. Multimed. Comput. Commun. Appl. 12(4), 1–13 (2016)
Huang, Z., Liu, S.: Perceptual hashing with visual content understanding for reduced-reference screen content image quality assessment. IEEE Trans. Circ. Syst. Video Technol. (2020). https://doi.org/10.1109/TCSVT.2020.3027001
Su, Z., Yao, L., Mei, J., Zhou, L., Li, W.: Learning to hash for personalized image authentication. IEEE Trans. Circ. Syst. Video Technol. (2020). https://doi.org/10.1109/TCSVT.2020.3002146
Tang, Z., Yu, M., Yao, H., Zhang, H., Yu, C., Zhang, X.Q.: Robust image hashing with singular values of quaternion SVD. Comput. J. (2019). https://doi.org/10.1093/comjnl/bxz127
Tang, Z., Zhang, X., Zhang, S.: Robust perceptual image hashing based on ring partition and NMF. IEEE Trans. Knowl. Data Eng. 26(3), 711–724 (2014)
Tang, Z., Lao, H., Zhang, X.Q., Liu, K.: Robust image hashing via DCT and LLE. Comput. Secur. 62, 133–148 (2016)
Sun, R., Yan, X., Ding, Z.: Robust image hashing using locally linear embedding. In: Proc. of the 2011 International Conference on Computer Science and Service System (CSSS), pp. 715–718 (2011)
Liang, X., Tang, Z., Xie, X., Wu, J., Zhang, X.: Robust and fast image hashing with two-dimensional PCA. Multimed. Syst. 27(3), 389–401 (2020)
Lei, Y., Wang, Y., Huang, J.: Robust image hash in Radon transform domain for authentication. Signal Process. Image Commun. 26(6), 280–288 (2011)
Tang, Z., Huang, L., Yang, F., Zhang, X.: Robust image hashing based on fan-beam transform. ICIC Express Lett. 8(8), 2365–2372 (2014)
Li, Y., Lu, Z., Zhu, C.E., Niu, X.: Robust image hashing based on random gabor filtering and dithered lattice vector quantization. IEEE Trans. Image Process 21(4), 1963–1980 (2012)
Huang, Z., Liu, S.: Perceptual image hashing with texture and invariant vector distance for copy detection. IEEE Trans. Multimedia 23, 1516–1529 (2020)
Liu, S., Huang, Z.: Efficient image hashing with geometric invariant vector distance for copy detection. ACM Trans. Multimed. Comput. Commun. Appl. 4, 1–22 (2019)
Tang, Z., Li, X., Zhang, X., Dai, Y.: Image hashing with color angle. Neurocomputing 308, 147–158 (2018)
Huang, C., Zhou, X., Hu, J., Zhou, Q.: SAR image noise suppression of BEMD by the kernel principle component analysis. IET Image Proc. 15(1), 155–165 (2021)
Chou, C.-H., Li, Y.-C.: A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile [J]. IEEE Trans. Circ. Syst. Video Technol. 5(6), 467–476 (1995)
Qin, C., Liu, E., Feng, G., Zhang, X.: Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints. IEEE Trans. Circ. Syst. Video Technol. 31(11), 4523–4537 (2021)
Wang, X., Pang, K., Zhou, X., Zhou, Y., Li, L., Xue, J.: A visual model-based perceptual image hash for content authentication. IEEE Trans. Inf. Foren. Secur. 10(7), 1336–1349 (2015)
Tang, Z., Zhang, H., Pun, C.-M., Mengzhu, Yu., Chunqiang, Yu., Zhang, X.: Robust image hashing with visual attention model and invariant moments. IET Image Proc. 14(5), 901–908 (2020)
Watson, A.B.: DCT quantization matrices visually optimized for individual images. Proc. SPIE. 11(11), 202–216 (1993)
Roweis, S.T., Saul, L.K.: Nonlinear dimensionality reduction by locally linear embedding. Science 290, 2323–2360 (2000)
USC-SIPI Image Database. Retrieved from: Available: http://sipi.usc.edu/database/. Accessed December 2020
Schaefer, G., Stich, M.: UCID. AN uncompressed colour image database. Proc. SPIE 5307, 472–480 (2004)
Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Process. Mag. 17(5), 58–64 (2000)
Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861–874 (2016)
Huang, X., Liu X., Wang, G., Su, M.: A robust image hashing with enhanced randomness by using random walk on zigzag blocking. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 14–18. IEEE, Piscataway (2016)
Qin, C., Sun, M., Chang, C.-C.: Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process. 142(Jan), 194–205 (2017)
Chen, Z., Sun, S.K.: A Zernike moment phase-based descriptor for local image representation and matching [J]. IEEE Trans. Image Process. 19(1), 205–219 (2010)
Acknowledgements
This work was supported by the Anhui Provincial Key Research and Development Plan under Grant 201904a05020091, the Provincial Natural Science Research Program of Higher Education Institutions of Anhui province under Grant KJ2021A1030 and the Key Scientific Research Projects of Chaohu University under Grant XLZ-202108.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Xing, H., Che, H., Wu, Q. et al. Image perceptual hashing for content authentication based on Watson’s visual model and LLE. J Real-Time Image Proc 20, 7 (2023). https://doi.org/10.1007/s11554-023-01269-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11554-023-01269-9