Skip to main content
Log in

Perceptual image hashing using transform domain noise resistant local binary pattern

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A new Discrete Cosine Transform (DCT) domain Perceptual Image Hashing (PIH) scheme is proposed in this paper. PIH schemes are designed to extract a set of features from an image to form a compact representation that can be used for image integrity verification. A PIH scheme takes an image as the input, extracts its invariant features and constructs a fixed length output, which is called a hash value. The hash value generated by a PIH scheme is then used for image integrity verification. The basic requirement for any PIH scheme is its robustness to non-malicious distortions and discriminative ability to detect minute level of tampering. The feature extraction phase plays a major role in guaranteeing robustness and tamper detection ability of a PIH scheme. The proposed scheme fuses together the DCT and Noise Resistant Local Binary Pattern (NRLBP) to compute image hash. In this scheme, an input image is divided into non-overlapping blocks. Then, DCT of each non-overlapping block is computed to form a DCT based transformed image block. Subsequently, NRLBP is applied to calculate NRLBP histogram. Histograms of all the blocks are concatenated together to get a hash vector for a single image. It is observed that low frequency DCT coefficients inherently have quite high robustness against non-malicious distortions, hence the NRLBP features extracted from the low frequency DCT coefficients provide high robustness. Computational results exhibit that the proposed hashing scheme outperforms some of the existing hashing schemes as well as can detect localized tamper detection as small as 3% of the original image size and at the same time resilient against non-malicious distortions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Abbas SQ, Ahmed F, Živić N, Ur-Rehman O (2016) Perceptual image hashing using SVD based noise resistant local binary pattern, in 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 401–407: IEEE

  2. Ahmed F, Siyal MY, Abbas VUJSP (2010) A secure and robust hash-based scheme for image authentication. Signal Processing, Elsevier 90(5):1456–1470

    Article  Google Scholar 

  3. Armas Vega E, Sandoval Orozco A, García Villalba L, Hernandez-Castro J (2018) Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns. Sensors 18(10):3372

    Article  Google Scholar 

  4. Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245

    Article  Google Scholar 

  5. Chang J-D, Chen B-H, Tsai C-S (2013) LBP-based fragile watermarking scheme for image tamper detection and recovery, in 2013 International Symposium on Next-Generation Electronics, pp. 173–176: IEEE

  6. Chaudhary C, Goyal P, Prasad DN, Chen Y-PP (2019) Enhancing the quality of image tagging using a Visio-textual Knowledge Base. IEEE Transactions on Multimedia 22(4):897–911

    Article  Google Scholar 

  7. Chaudhary C, Goyal P, Goyal N, Chen Y-PP (2020) Image retrieval for complex queries using knowledge embedding. ACM Transactions on Multimedia Computing, Communications, Applications 16(1):1–23

    Article  Google Scholar 

  8. Chen X, Qin C, Ji P (2015) Perceptual image hashing using block truncation coding and local binary pattern, in 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), pp. 856–859: IEEE

  9. Davarzani R, Mozaffari S, Yaghmaie K (2015) Image authentication using LBP-based perceptual image hashing. Journal of AI and Data Mining 3(1):21–30

    Google Scholar 

  10. Davarzani R, Mozaffari S, Yaghmaie K (2016) Perceptual image hashing using center-symmetric local binary patterns. Multimed Tools Appl 75(8):4639–4667

    Article  Google Scholar 

  11. Dong C, Loy CC, Tang X (2016) Accelerating the Super-Resolution Convolutional Neural Network, in European Conference on Computer Vision, Cham, pp. 391–407: Springer International Publishing

  12. Du L, Chen Z, Ho AT (2020) Binary multi-view perceptual hashing for image authentication, Multimed Tools Appl, pp. 1–23

  13. Eskenazi S, Bodin B, Gomez-Krämer P, Ogier J-M (2017) A perceptual image hashing algorithm for hybrid document security, in 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), vol. 1, pp. 741–746: IEEE

  14. Gonzalez R Woods R (2017) Digital image processing, 4th edn. ISBN: 9780133356724, ed: Pearson

  15. Hassan AM, Hasan YM, Wahab MA (2012) Robust visual hashing for image authentication, in International Conference on Communications and Information Technology Computing, pp. 763–767

  16. Hernandez RAP, Miyatake MN, Kurkoski BM (2011) Robust image hashing using image normalization and SVD decomposition, in 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1–4: IEEE

  17. Holmgren J, Lombardi A (2018) Cryptographic hashing from strong one-way functions (or: One-way product functions and their applications), in 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS), pp. 850–858: IEEE

  18. Karsh RK, Saikia A, Laskar RH (2018) Image authentication based on robust image hashing with geometric correction. Multimed Tools Appl 77(19):25409–25429

    Article  Google Scholar 

  19. Khelaifi F, He H (2020) Perceptual image hashing based on structural fractal features of image coding and ring partition, Multimed Tools Appl, pp. 1–20

  20. Lee H, Chen Y-PP (2014) Cell morphology based classification for red cells in blood smear images. Pattern Recogn Lett 49:155–161

    Article  Google Scholar 

  21. Lee H, Chen Y-PP (2015) Image based computer aided diagnosis system for cancer detection. Expert Syst Appl 42(12):5356–5365

    Article  Google Scholar 

  22. Lei Y, Wang Y, Huang J (2011) Robust image hash in radon transform domain for authentication. Signal Process Image Commun 26(6):280–288

    Article  Google Scholar 

  23. Li Y, Wan L, Fu T, Hu W (2019) Piecewise supervised deep hashing for image retrieval. Multimed Tools Appl 78(17):24431–24451

    Article  Google Scholar 

  24. Liu Y, Xiao Y (2013) A robust image hashing algorithm resistant against geometrical attacks. Radioengineering 22(4):1072–1082

    MathSciNet  Google Scholar 

  25. Liu X, Sun C, Yang LT (2015) DCT-based objective quality assessment metric of 2D/3D image. Multimed Tools Appl 74(8):2803–2820

    Article  Google Scholar 

  26. Liu H, Kadir A, Liu J (2019) Keyed hash function using hyper chaotic system with time-varying parameters perturbation. IEEE Access 7:37211–37219

    Article  Google Scholar 

  27. Monga V, Evans BL (2006) Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Process 15(11):3452–3465

    Article  Google Scholar 

  28. Niu Y, Liu F, Li X, Gleicher M (2012) Image resizing via non-homogeneous warping. Multimedia Tools Applications 56(3):485–508

    Article  Google Scholar 

  29. Ojala T, Pietikäinen M, Harwood D (1996) A comparative study of texture measures with classification based on featured distributions. Pattern Recogn 29(1):51–59

    Article  Google Scholar 

  30. Paul M, Karsh RK, Talukdar FA (2019) Image Hashing based on Shape Context and Speeded Up Robust Features (SURF), in 2019 International Conference on Automation, Computational and Technology Management (ICACTM), pp. 464–468: IEEE

  31. Pietikäinen M, Hadid A, Zhao G, Ahonen T (2011) Computer vision using local binary patterns. Springer Science & Business Media

  32. Qin C, Hu Y, Yao H, Duan X, Gao LJIA (2019) Perceptual image hashing based on weber local binary pattern and color angle representation. IEEE Access 7:45460–45471

    Article  Google Scholar 

  33. Ren J, Jiang X, Yuan J (2016) Face and facial expressions recognition and analysis, in Context Aware Human-Robot and Human-Agent Interaction: Springer, pp. 3–29

  34. Roweis ST, Saul LK (2000) Nonlinear dimensionality reduction by locally linear embedding. Science 290(5500):2323–2326

    Article  Google Scholar 

  35. Sajjad M, Haq IU, Lloret J, Ding W, Muhammad K (2019) Robust image hashing based efficient authentication for smart industrial environment. IEEE Transactions on Industrial Informatics 15:6541–6550

    Article  Google Scholar 

  36. Sebastian LS, Varghese A, Manesh T (2015) Image authentication by content preserving robust image hashing using local and global features. Procedia Computer Science 46:1554–1560

    Article  Google Scholar 

  37. Stallings W (2017) Cryptography and network security: principles and practice. Pearson Upper Saddle River

  38. Swaminathan A, Mao Y, Wu M, security (2006) Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1(2):215–230

    Article  Google Scholar 

  39. Tang Z, Dai Y, Zhang X, Zhang S (2012) Perceptual image hashing with histogram of color vector angles, in International Conference on Active Media Technology, pp. 237–246: Springer

  40. Tang Z, Zhang X, Zhang S (2013) Robust perceptual image hashing based on ring partition and NMF. IEEE Trans Knowl Data Eng 26(3):711–724

    Article  Google Scholar 

  41. Tang Z, Yu Y, Zhang H, Yu M, Yu C, Zhang X (2019) Robust image hashing via visual attention model and ring partition. Math Biosci Eng 16:6103–6120

    Article  MathSciNet  Google Scholar 

  42. Venkatesan R, Koon S-M, Jakubowski MH, Moulin P (2000) Robust image hashing, in Proceedings 2000 International Conference on Image Processing (Cat. No. 00CH37101), vol. 3, pp. 664–666: IEEE

  43. Wu M, Mao Y, Swaminathan A (2007) A signal processing and randomization perspective of robust and secure image hashing, in 2007 IEEE/SP 14th Workshop on Statistical Signal Processing, pp. 166–170: IEEE

  44. Yang H, Yin J, Yang Y (2019) Robust image hashing scheme based on low-rank decomposition and path integral LBP. IEEE Access 7:51656–51664

    Article  Google Scholar 

  45. Zhao Y, Wang S, Zhang X, Yao H, security (2012) Robust hashing for image authentication using Zernike moments and local features. IEEE Transactions on Information Forensics and Security 8(1):55–63

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi-Ping Phoebe Chen.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abbas, S.Q., Ahmed, F. & Chen, YP.P. Perceptual image hashing using transform domain noise resistant local binary pattern. Multimed Tools Appl 80, 9849–9875 (2021). https://doi.org/10.1007/s11042-020-10135-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10135-w

Keywords

Navigation