Skip to main content
Log in

Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Media hashing is an alternative approach to many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their limited resistance to geometric attacks. In this paper, a novel geometric distortion-invariant image hashing scheme, which can be employed to perform copy detection and content authentication of digital images, is proposed. Our major contributions are threefold: (i) a mesh-based robust hashing function is proposed; (ii) a sophisticated hash database for error-resilient and fast matching is constructed; and (iii) the application scalability of our scheme for content copy tracing and authentication is studied. In addition, we further investigate several media hashing issues, including robustness and discrimination, error analysis, and complexity, with respect to the proposed image hashing system. Exhaustive experimental results obtained from benchmark attacks confirm the excellent performance of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Oostveen, J., Lu, C.S., Sun, Q.: IEEE International Conference on Multimedia and Expo: Special Session on Media Identification, (co-organizers) (2004)

  2. IEEE International Workshop on Multimedia Signal Processing (MMSP) Special Session on Media Recognition, Virgin Islands, USA (2002)

  3. Dittmann, J., Steinmetz, A., Steinmetz, R.: Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceedings of the IEEE International Conference on Multimedia Computing and Systems, vol. II, pp. 209–213. Italy (1999)

  4. Lin, C.Y., Chang, S.F.: Generating robust digital signature for image/video authentication. In: Proceedings of the ACM Multimedia and Security Workshop. U.K. (1998)

  5. Chang, E.Y., Wang, J.Z., Li, C., Wiederhold, G.: RIME: A replicated image detector for the world wide web. In: Proceedings of the SPIE: Multimedia Storage and Archiving Systems, vol. III, 1998

  6. Chang, E.Y., Li, C., Wang, J.Z., Mork, P., Wiederhold, G.: Searching Near-Replicas of Images via Clustering. In: Proceedings of the SPIE Symposium of Voice, Video, and Data Communications, pp. 281–292. Boston (1999)

  7. Meng, Y., Chang, E.: Image copy detection using dynamic partial function. In: Proc. SPIE Storage Retrieval Media Database. 5021, 176–186 (2003)

    Google Scholar 

  8. Li, B., Chang, E., Wu, C.T.: DPF—A perceptual distance function for image retrieval. In: Proceedings of the IEEE International Conference on Image Processing, Vol. II. 597–600, Rochester (2002)

  9. Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Systems Video Tech. 11(2), 153–168 (2001)

    MathSciNet  Google Scholar 

  10. Lu, C.S., Mark Liao, H.Y.: Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia 5(2), 161–173 (2003)

    Google Scholar 

  11. Fridrich, J.: Visual hash for oblivious watermarking. In: Proceedings SPIE: Security and Watermarking of Multimedia Contents II, 286–294, San Jose, California (2000)

  12. Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings IEEE International Conference on Information Technology: Coding and Computing, pp 178–183, Las Vegas, Nevada (2000)

  13. Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust Image Hashing. In: Proceedings of the IEEE International Conference on Image Processing, Vol. III, 664–666, Vancouver (BC), CA (2000)

  14. Lefebvre, F., Macq, B.: RASH: RAdon Soft Hash algorithm. In: Proceedings European Signal Processing Conference. Toulouse, France (2002)

  15. Lefebvre, F., Czyz, J., Macq, B.: A robust soft hash algorithm for digital image signature. In: Proceedings of the IEEE International Conference on Image Processing. Vol. II, 495–498, Barcelona, Spain (2003)

  16. Seo, J.S., Haitsma, J., Kalker, T., Yoo, C.D.: A robust image fingerprinting system using the radon transform. Signal Process.: Image Commun. 19, 325–339 (2004)

    Google Scholar 

  17. Mihcak, M.K., Venkatesan, R.: New iterative geometric methods for robust perceptual image hashing. In: Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management. Philadelphia, PA (2001)

  18. Kim, C.: Content-based image copy detection. Signal Process.: Image Commun. 18, 169–184 (2003)

    Google Scholar 

  19. Petitcolas, F., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. Proceedings of the International Workshop on Information Hiding, LNCS 1575, pp. 219–239 (1998)

  20. Petitcolas, F.: Watermarking Schemes Evaluation. IEEE Signal Processing Magazine 17(5), 58–64 (2000)

    Article  Google Scholar 

  21. Bas, P., Chassery, J.M., Macq, B.: Geometrically invariant watermarking using feature points. IEEE Trans. Image Process. 11, 1014–1028 (2002)

    Article  Google Scholar 

  22. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

  23. Al-Mualla, M.E., Canagarajah, C.N., Bull, D.R.: Video coding for mobile communications, Academic Press. (2003)

  24. Heiny, L.: Advanced graphics programming using C/C++, John Wiley & Sons, Inc. (1993)

  25. Kalker, T.: Applications and challenges for audio fingerprinting. In: Proceedings of the 111th AES Convention, in the “Watermarking vs. Fingerprinting” Workshop, December 3 (2001)

  26. Mallat, S., Zhong, S.: Characterization of signals from multiscale edges. IEEE Trans. Pattern Anal. Machine Intell. 14(7), 710–732 (1992)

    Article  Google Scholar 

  27. Lu, C.S.: On the security of structural information extraction/embedding for images. In: Proceedings of the IEEE International Symposium on Circuits and Systems, vol. II, pp. 169-172. Vancouver, Canada (2004)

  28. Lu, C.S., Hsu, C.Y., Sun, S.W., Chang, P.C.: Robust mesh-based hashing for copy detection and tracing of images. In: Proceedings of the IEEE International Conference on Multimedia and Expo: Special session on media identification. Taipei, Taiwan (2004)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chun-Shien Lu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lu, CS., Hsu, CY. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multimedia Systems 11, 159–173 (2005). https://doi.org/10.1007/s00530-005-0199-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-005-0199-y

Keywords

Navigation