Abstract
Media hashing is an alternative approach to many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their limited resistance to geometric attacks. In this paper, a novel geometric distortion-invariant image hashing scheme, which can be employed to perform copy detection and content authentication of digital images, is proposed. Our major contributions are threefold: (i) a mesh-based robust hashing function is proposed; (ii) a sophisticated hash database for error-resilient and fast matching is constructed; and (iii) the application scalability of our scheme for content copy tracing and authentication is studied. In addition, we further investigate several media hashing issues, including robustness and discrimination, error analysis, and complexity, with respect to the proposed image hashing system. Exhaustive experimental results obtained from benchmark attacks confirm the excellent performance of the proposed method.
Similar content being viewed by others
References
Oostveen, J., Lu, C.S., Sun, Q.: IEEE International Conference on Multimedia and Expo: Special Session on Media Identification, (co-organizers) (2004)
IEEE International Workshop on Multimedia Signal Processing (MMSP) Special Session on Media Recognition, Virgin Islands, USA (2002)
Dittmann, J., Steinmetz, A., Steinmetz, R.: Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceedings of the IEEE International Conference on Multimedia Computing and Systems, vol. II, pp. 209–213. Italy (1999)
Lin, C.Y., Chang, S.F.: Generating robust digital signature for image/video authentication. In: Proceedings of the ACM Multimedia and Security Workshop. U.K. (1998)
Chang, E.Y., Wang, J.Z., Li, C., Wiederhold, G.: RIME: A replicated image detector for the world wide web. In: Proceedings of the SPIE: Multimedia Storage and Archiving Systems, vol. III, 1998
Chang, E.Y., Li, C., Wang, J.Z., Mork, P., Wiederhold, G.: Searching Near-Replicas of Images via Clustering. In: Proceedings of the SPIE Symposium of Voice, Video, and Data Communications, pp. 281–292. Boston (1999)
Meng, Y., Chang, E.: Image copy detection using dynamic partial function. In: Proc. SPIE Storage Retrieval Media Database. 5021, 176–186 (2003)
Li, B., Chang, E., Wu, C.T.: DPF—A perceptual distance function for image retrieval. In: Proceedings of the IEEE International Conference on Image Processing, Vol. II. 597–600, Rochester (2002)
Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Systems Video Tech. 11(2), 153–168 (2001)
Lu, C.S., Mark Liao, H.Y.: Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia 5(2), 161–173 (2003)
Fridrich, J.: Visual hash for oblivious watermarking. In: Proceedings SPIE: Security and Watermarking of Multimedia Contents II, 286–294, San Jose, California (2000)
Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings IEEE International Conference on Information Technology: Coding and Computing, pp 178–183, Las Vegas, Nevada (2000)
Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust Image Hashing. In: Proceedings of the IEEE International Conference on Image Processing, Vol. III, 664–666, Vancouver (BC), CA (2000)
Lefebvre, F., Macq, B.: RASH: RAdon Soft Hash algorithm. In: Proceedings European Signal Processing Conference. Toulouse, France (2002)
Lefebvre, F., Czyz, J., Macq, B.: A robust soft hash algorithm for digital image signature. In: Proceedings of the IEEE International Conference on Image Processing. Vol. II, 495–498, Barcelona, Spain (2003)
Seo, J.S., Haitsma, J., Kalker, T., Yoo, C.D.: A robust image fingerprinting system using the radon transform. Signal Process.: Image Commun. 19, 325–339 (2004)
Mihcak, M.K., Venkatesan, R.: New iterative geometric methods for robust perceptual image hashing. In: Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management. Philadelphia, PA (2001)
Kim, C.: Content-based image copy detection. Signal Process.: Image Commun. 18, 169–184 (2003)
Petitcolas, F., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. Proceedings of the International Workshop on Information Hiding, LNCS 1575, pp. 219–239 (1998)
Petitcolas, F.: Watermarking Schemes Evaluation. IEEE Signal Processing Magazine 17(5), 58–64 (2000)
Bas, P., Chassery, J.M., Macq, B.: Geometrically invariant watermarking using feature points. IEEE Trans. Image Process. 11, 1014–1028 (2002)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Al-Mualla, M.E., Canagarajah, C.N., Bull, D.R.: Video coding for mobile communications, Academic Press. (2003)
Heiny, L.: Advanced graphics programming using C/C++, John Wiley & Sons, Inc. (1993)
Kalker, T.: Applications and challenges for audio fingerprinting. In: Proceedings of the 111th AES Convention, in the “Watermarking vs. Fingerprinting” Workshop, December 3 (2001)
Mallat, S., Zhong, S.: Characterization of signals from multiscale edges. IEEE Trans. Pattern Anal. Machine Intell. 14(7), 710–732 (1992)
Lu, C.S.: On the security of structural information extraction/embedding for images. In: Proceedings of the IEEE International Symposium on Circuits and Systems, vol. II, pp. 169-172. Vancouver, Canada (2004)
Lu, C.S., Hsu, C.Y., Sun, S.W., Chang, P.C.: Robust mesh-based hashing for copy detection and tracing of images. In: Proceedings of the IEEE International Conference on Multimedia and Expo: Special session on media identification. Taipei, Taiwan (2004)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lu, CS., Hsu, CY. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multimedia Systems 11, 159–173 (2005). https://doi.org/10.1007/s00530-005-0199-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-005-0199-y