Elsevier

Pattern Recognition

Volume 43, Issue 3, March 2010, Pages 636-649
Pattern Recognition

Image replica detection system utilizing R-trees and linear discriminant analysis

https://doi.org/10.1016/j.patcog.2009.08.023Get rights and content

Abstract

This manuscript introduces a novel system for content-based identification of image replicas. The proposed approach utilizes image resemblance for deciding whether a test image has been replicated from a certain original or not. We formulate replica detection as a classification problem and show that we can optimize efficiency on a per query basis by dynamically solving a reduced multiclass problem. For this purpose, we investigate the effective coupling of multidimensional indexing and machine learning approaches and we aim to achieve replica detection through the training of classifiers with distortions expected in a replica. Visual descriptors are indexed using an R-tree based multidimensional structure for fast image retrieval. Cases unsuccessfully handled by the R-tree are resolved by a multiclass classifier operating on the transformed feature space that results from the application of linear discriminant analysis (LDA) and principal component analysis (PCA). Experimental results show that the proposed system can identify replicas with high accuracy and facilitate a wide range of applications such as copyright protection, content-based monitoring, content-aware multimedia management, etc.

Introduction

Recent technological advances in the area of multimedia content distribution have resulted in a major reorganization of this trade. Valuable digital artworks can be reproduced and distributed arbitrarily, sometimes without any control by their owners. The identification of replicated data is considered an important issue for a number of applications such as copyright infringement, digital rights management, multimedia management using content-aware networks, monitoring and filtering broadcasted content (e.g., tracking of child pornography content), etc. Among the various types of multimedia content, images are a particularly valuable asset and will be the focus of this manuscript. The approaches that have been proposed for robust image identification are watermarking and, recently, image replica detection algorithms.

Watermarking is the technique of imperceptibly embedding information within the host image content [1]. Although watermarking has attracted considerable interest from both industry and academia, it bears certain deficiencies that pose limitations on its use. The requirement of embedding information in a digital image before it is made public, automatically excludes images that are already in the public domain and need to be copyright protected. Another inherent watermarking drawback is the fact that it is an active technique i.e., it modifies the content of the images to be protected. Although these modifications are in general invisible, they do exist and might create problems in certain content categories like medical images, where quality requirements are extremely high.

In order to overcome these inherent watermarking deficiencies, the scientific community started to investigate robust image identification from a content-based perspective. Replica detection, also referred as replica recognition, near-replica detection, perceptual or robust hashing [2], content-based copy detection [3], and multimedia fingerprinting aims at identifying all images that have been reproduced from a source original through the application of intentional or unintentional manipulations. It is based on image similarity and relies on the assumption that images shares plenty of information with their replicas and yet contains enough information to be discriminated from any other non-replica image. The type and severity of manipulations that should be successfully handled by a replica detection system depend on the target application.

The major benefit of such an approach stems from the fact that no additional information should be embedded within the image content, thus eliminating the invisibility constraint inherent to watermarking systems. On the other hand, the fact that the response speed and efficiency of a replica detection scheme is largely affected by the size of the original/reference image dataset, can be considered as the disadvantage of such an approach. All the above make replica detection an important alternative to watermarking that found applications on many types of multimedia data, such as video [4], [3] and audio [5]. Although the problem formulation as described above, bears many similarities with content based image retrieval (CBIR), certain differences do exist, that are detailed in Section 2.

Image replica detection research is still in its early stages, thus only few works addressing tasks identical or slightly different to the one addressed in this manuscript can be found in the literature. In order to tackle the replica detection problem, existing works aim at (a) optimizing the distance function quantifying the perceptual similarity between two images [6], [7], (b) extracting highly representative and informative features for discriminating between replicas and non-replicas [8], [9], or (c) using machine learning techniques and considering the problem as a classification task [10], [11], [12].

In the first case, Qamra et al. [6] present an enhanced perceptual distance function (DPF) which adaptively chooses a different set of features according to their discriminative power. The benefit of this approach is that unlike other schemes that select that same features for all the images, DPF dynamically activate features (with minimum difference) in a pair-wise fashion. In the same direction Kim [7] use the ordinal measure of DCT coefficients as the feature to represent images and the ordinal measures of AC coefficients for measuring distance similarity. A scheme for the optimal selection of a similarity threshold, based on the maximum a posteriori (MAP) criterion, is used to enhance the efficiency of the employed distance function.

Concerning methods that focus on robust features extraction, Ke et al. [9] use PCA-SIFT [13], a local descriptor that has been shown to be more discriminative and compact than the original SIFT [14], and features several characteristics that are ideal for solving the image replica detection problem. Roy and Chang [8] on the other hand, focus on finding a feature space where any two images in the database are well separated from each other. More precisely, the original images are slightly modified in order to increase their mutual separation within the feature space, while taking care that the perceptual difference between the original and the modified image is kept to a minimum.

Finally, in the group of methods that view the problem as a classification task, Maret et al. [10] propose a method where binary classifiers based on support vector machines are constructed for each original image and are independently applied to decide whether a query image is a replica or not. A variation of this system is described in [11] where indexing is used to perform a coarse and rapid selection of the most likely originals and reduce the number of classifiers that need to be applied. In a more recent work [12] the authors improve their method by trying to estimate and efficiently describe the partition of the image space that contains the replicas of a particular original image.

Even though the systems introduced in the aforementioned papers are trying to tackle the same replica detection problem, the proposed solutions, except from the ones proposed in [10], [11], [12], rely mainly on the discriminative power of the extracted features and the effectiveness of the employed distance function. Thus, no particular attention is paid to the fact that having many similarities with a classification problem, image replica detection might benefit from the use of appropriately trained classifiers. In our work we try to take advantage of this fact by searching for an optimal space where the projection of visual features will enable the construction of more discriminant classifiers. The proposed system operates upon a database of stored originals. Its novelty stems from the fact that image similarity is dealt as a classification problem that employs a training scheme and a suitable feature space transformation in order to increase the system robustness. It generates training images based on the types of attacks that the system is designed to cope with, and during the classification process it uses class statistic information to achieve maximum separability between classes.

More specifically, each image is represented by a feature vector and a multidimensional indexing structure based on R-trees [15] is used for indexing these vectors. The “hyper-bounding boxes” employed by the R-tree are selected using an attack-oriented training strategy that aims at modeling all potential attacks that the system is designed to encounter. The structure returns a relatively small set of images (ideally one) that are candidates for being the original of the query image. In order to resolve cases where more than one candidates are returned by the R-tree we introduce the dynamic use of discriminant techniques. Each candidate original and its modified copies are assumed to form a class. Linear discriminant analysis (LDA) [16] is applied in order to yield more discriminant image representations taking into account class information. The resulting representations are expected to be more easily separable, since the reduced number of involved classes facilitates the estimation of a class-discriminant projection space. A classification function is subsequently applied on the projection space for selecting the image corresponding to the original version of the query, if such an image indeed exists. It must be noted that the manuscript is a largely extended and improved version of [17] where the proposed approach was initially presented.

The rest of the manuscript is organized as follows. Section 2 provides a solid definition of image replica detection and outlines its particularities with respect to image retrieval systems. The proposed image replica detection system is described in Section 3. Section 4 describes the experiments conducted and summarizes the performance evaluation results. Concluding remarks are drawn in Section 5.

Section snippets

Image replica detection vs. content based image retrieval

The goal of a query by example content based image retrieval (CBIR) system is to return a set of database images that are related to the query image in a broad sense of similarity [18]. On the other hand, an image replica detection system (RDS) should retrieve a database image only if the query image is a replica of this image, otherwise no image should be retrieved. Thus, the notion of similarity in an RDS is considerably different than similarity in the sense of general purpose CBIR.

System overview

The process of engineering the proposed system can be separated into two phases. The first deals with the database organization. Each time a new image is added into the database it is subjected to a series of predefined manipulations. These manipulations are selected according to the system specifications and simulate all types of attacks that we wish the system to be able to withstand. Feature vectors are extracted from each attacked version resulting in a matrix (from here on called the

Test set characteristics

Prior to presenting the results, it is necessary to describe the particular characteristics of the experimental testbed. Two image sets were used in experiments. A sample of 2.232 color images were downloaded from the Internet to compose the first set, from here on referred as the Monument set. Images were selected so as to form 12 content categories, each containing different views of a famous monument, as shown in Table 1. The rationale was to construct a test set consisting of images

Conclusions

In this manuscript, we describe a replica detection system that operates upon a database of stored originals. Motivated by the fact that replica detection has many common characteristics with a classification problem, we worked towards the employment of proper training strategies for improving efficiency. This training strategy is used to drive both image indexing conducted using an R-tree and the construction of robust classifiers in a transformed feature space. This feature space is generated

Acknowledgments

This work was developed within ECRYPT IST-2002-507932, European Network of Excellence in Cryptology (http://www.ecrypt.eu.org/), funded under the European Commission IST FP6 programme.

About the Author—SPIROS NIKOLOPOULOS received his diploma degree in Computer Engineering and Informatics and the MSc degree in Computer Science and Technology from University of Patras, Greece in 2002 and 2004, respectively. He is currently working as a research associate with the Informatics and Telematics Institute (ITI) and he is a member of Multimedia Knowledge LAB (MKL). He has participated in a number of IST projects and his research interests include image analysis, indexing and

References (38)

  • C. Kim

    Content-based image copy detection

    Signal Process. Image Commun.

    (2003)
  • Y. Maret et al.

    Adaptive image replica detection based on support vector classifiers

    Signal Process. Image Commun.

    (2006)
  • A. Tefas et al.

    Watermarking techniques for image authentication and copyright protection

    The Handbook of Image and Video Processing

    (2005)
  • A. Swaminathan, Y. Mao, M. Wu, Image hashing resilient to geometric and filtering operations, in: IEEE Workshop on...
  • A. Joly et al.

    Content-based copy retrieval using distortion-based probabilistic similarity search

    IEEE Trans. Multimedia

    (2007)
  • B. Coskun et al.

    Spatio-temporal transform based video hashing

    IEEE Trans. Multimedia

    (2006)
  • P. Cano, E. Batle, T. Kalker, J. Haitsma, A review of algorithms for audio fingerprinting, in: IEEE Workshop on...
  • A. Qamra et al.

    Enhanced perceptual distance functions and indexing for image replica recognition

    IEEE Trans. Pattern Anal. Mach. Intell.

    (2005)
  • S. Roy, E.-C. Chang, K. Natarajan, A unified framework for resolving ambiguity in copy detection, in: Proceedings of...
  • Y. Ke, R. Sukthankar, L. Huston, An efficient parts-based near-duplicate and sub-image retrieval system, in:...
  • Y. Maret, S. Nikolopoulos, F. Dufaux, T. Ebrahimi, N. Nikolaidis, A novel replica detection system using binary...
  • Y. Maret, D. Marimon, F. Dufaux, T. Ebrahimi, Hierarchical Indexing using R-trees for Replica Detection, in: SPIE,...
  • Y. Ke, R. Sukthankar, Pca-sift: a more distinctive representation for local image descriptors, in: Proceedings of the...
  • D.G. Lowe

    Distinctive image features from scale-invariant keypoints

    Int. J. Comput. Vision

    (2004)
  • A. Gutmann, R-trees: a dynamic index structure for spatial searching, in: Proceedings of the ACM International...
  • K. Fukunaga

    Introduction to Statistical Pattern Recognition

    (1990)
  • S. Nikolopoulos, S. Zafeiriou, P. Sidiropoulos, N. Nikolaidis, I. Pitas, Image replica detection using r-trees and...
  • A. Smeulders et al.

    Content-based image retrieval at the end of the early years

    IEEE Trans. Pattern Anal. Mach. Intell.

    (2000)
  • M.A. Gavrielides et al.

    Color-based descriptors for image fingerprinting

    IEEE Trans. Multimedia

    (2006)
  • Cited by (10)

    • Robust Copy–Move forgery revealing in digital images using polar coordinate system

      2017, Neurocomputing
      Citation Excerpt :

      The techniques of image forgery detection can be categorized into two methods: active and passive. Active methods are based on prior information about the original image such as watermarking [1] and illegal image copy detection [2–4]. In many cases, prior information about the original image is not available to the detector.

    • An efficient expanding block algorithm for image copy-move forgery detection

      2013, Information Sciences
      Citation Excerpt :

      Image authentication techniques can be classified into two categories: active methods and passive methods. Active methods such as watermarking [10,21] or illegal image copy detection [8,13,17] depend on prior information about the image. However, in many situations, prior information regarding an image is not available and passive, or blind, methods should be used to authenticate the image.

    • Image Forgery Detection using Block Matching and K-Means Clustering Techniques

      2023, Proceedings of the 8th International Conference on Communication and Electronics Systems, ICCES 2023
    • Rotation Invariant Forgery Detection using LBP Variants

      2019, International Journal of Engineering Trends and Technology
    • Copy move image forgery detection based on Polar Fourier representation

      2018, International Journal of Machine Learning and Computing
    • A proposed accelerated image copy-move forgery detection

      2015, 2014 IEEE Visual Communications and Image Processing Conference, VCIP 2014
    View all citing articles on Scopus

    About the Author—SPIROS NIKOLOPOULOS received his diploma degree in Computer Engineering and Informatics and the MSc degree in Computer Science and Technology from University of Patras, Greece in 2002 and 2004, respectively. He is currently working as a research associate with the Informatics and Telematics Institute (ITI) and he is a member of Multimedia Knowledge LAB (MKL). He has participated in a number of IST projects and his research interests include image analysis, indexing and retrieval, multimedia analysis using semantic information and integration of context and content for multimedia interpretation. His scientific work has been published in many international conferences and book chapters and he currently serves as a reviewer of the IEEE community.

    About the Author—STEFANOS ZAFEIRIOU was born in Thessaloniki, Greece in 1981. He received the BSc, degree in Informatics with highest honors in 2003 and the PhD degree in Informatics in 2007, both from the Aristotle University of Thessaloniki, Thessaloniki, Greece. He has co-authored over than 30 journal and conference publications. During 2007–2008 he was a senior researcher at the Department of Informatics at the Aristotle University of Thessaloniki. Currently, he is a senior researcher at the Department of Electrical and Electronic Engineering at Imperial College London, UK. His current research interests lie in the areas of signal and image processing, computational intelligence, pattern recognition, machine learning, computer vision and detection and estimation theory. Dr. Zafeiriou received various scholarships and awards during his undergraduate, PhD and postdoctoral studies.

    About the Author—NIKOS NIKOLAIDIS received the Diploma of Electrical Engineering and the PhD degree in electrical engineering from the Aristotle University of Thessaloniki, Thessaloniki, Greece, in 1991 and 1997, respectively. From 1992 to 1996, he was Teaching Assistant at the Departments of Electrical Engineering and Informatics at the Aristotle University of Thessaloniki. From 1998 to 2002, he was a Postdoctoral Researcher and Teaching Assistant at the Department of Informatics, Aristotle University of Thessaloniki, where he is currently an Assistant Professor. He is the co-author of the book 3-D Image Processing Algorithms (New York: Wiley, 2000). He has co-authored 11 book chapters, 29 journal papers, and 90 conference papers. His research interests include computer graphics, image and video processing and analysis, computer vision, copyright protection of multimedia, and 3-D image processing. Dr. Nikolaidis currently serves as Associate Editor for the International Journal of Innovative Computing Information and Control, the International Journal of Innovative Computing Information and Control Express Letters and the EURASIP Journal on Image and Video Processing.

    About the Author—IOANNIS PITAS received the Diploma of Electrical Engineering in 1980 and the PhD degree in Electrical Engineering in 1985 both from the Aristotle University of Thessaloniki, Greece. Since 1994, he has been a Professor at the Department of Informatics, Aristotle University of Thessaloniki. From 1980 to 1993 he served as Scientific Assistant, Lecturer, Assistant Professor, and Associate Professor in the Department of Electrical and Computer Engineering at the same University. He served as a Visiting Research Associate or Visiting Assistant Professor at several Universities. He has published over 607 papers and contributed in 27 books in his areas of interest and edited or co-authored another 7. He has also been an invited speaker and/or member of the program committee of several scientific conferences and workshops. In the past he served as Associate Editor or co-Editor of four international journals and General or Technical Chair of three international conferences. His current interests are in the areas of digital image and video processing and analysis, multidimensional signal processing, watermarking and computer vision.

    View full text