Skip to main content

Perceptual Image Hashing with Bidirectional Generative Adversarial Networks for Copy Detection

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1588))

Included in the following conference series:

Abstract

The traditional perceptual hashing algorithm is generally achieved by artificially extracting features from an image and quantizing them into a hash code. However, it is often hard to capture the inherent features of an image in practice. In order to improve the performance of image perceptual hashing, an unsupervised data-driven generative adversarial framework to generate the image perceptual hash code is proposed in this paper. Firstly, the original image is normalized and the encoder network is employed to generate the perceptual hash code; then, the generator network is used to formulate a data distribution as similar as possible to the original image from random noise in the same dimension as the perceptual hash code. Thirdly, the discriminator network is adopted to distinguish the hash code from the noise modified by the generated network and the source of the generated image and the original image. Finally, the encoder can generate image hash codes with good perceptual robustness and recognition accuracy by jointly training of the three networks. Various experiments have been executed on an extensive test database in this paper. The results show that the proposed perceptual image hashing algorithm has stronger robustness than other state-of-the-art schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proceedings of 3rd IEEE International Conference on Image Processing, pp. 227–230 (1996)

    Google Scholar 

  2. Huang, Z., Liu, S.: Perceptual image hashing with texture and invariant vector distance for copy detection. IEEE Trans. Multimedia (2020). https://doi.org/10.1109/TMM.2020.2999188

    Article  Google Scholar 

  3. Hosny, M., Khalid, K.M., Yasmeen, I.: Walid: Robust image hashing using exact Gaussian-Hermite moments. IET Image Proc. 12, 2178–2185 (2018)

    Article  Google Scholar 

  4. Tang, Z., Lao, H., Zhang, X., Liu, K.: Robust image hashing via DCT and LLE. Comput. Secur. 62, 133–148 (2016)

    Article  Google Scholar 

  5. Tang, Z., Huang, Z., Zhang, X., Lao, H.: Robust image hashing with multidimensional scaling. Signal Process. 137, 240–250 (2017)

    Article  Google Scholar 

  6. Yang, H., Yin, J., Yang, Y.: Robust image hashing scheme based on low-rank decomposition and path integral LBP. IEEE Access 7(1), 51656–51664 (2019)

    Article  Google Scholar 

  7. Tang, Z., Huang, L., Zhang, X., Lao, H.: Robust image hashing based on color vector angle and Canny operator. AEU-Int. J. Electron. C. 70, 833–841 (2016)

    Article  Google Scholar 

  8. Qin, C., Liu, E., Feng, G., Zhang, X.: Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints. IEEE Trans. Circuits Syst. Video Technol. (2020). https://doi.org/10.1109/TCSVT.2020.3047142

  9. Liu, X., Liang, J., Wang, Z.Y., Tsai, Y.T., Lin, C.C., Chen, C.C.: Content-based image copy detection using convolutional neural network. Electronics (2020). https://doi.org/10.3390/electronics9122029

  10. Li, Z., Xu, X., Zhang, D., Zhang, P.: Cross-modal hashing retrieval based on deep residual network. Comput. Syst. Sci. Eng. 36(2), 383–405 (2021)

    Article  Google Scholar 

  11. Song, J., He, T., Gao, L., Xu, X., Hanjalic, A.: Binary generative adversarial networks for image retrieval. Int. J. Comput. Vision 2020, 1–22 (2020)

    MathSciNet  MATH  Google Scholar 

  12. Li, Y., Wang, T.: Robust and secure image fingerprinting learned by neural network. IEEE Trans. Circuits Syst. Video Technol. 30, 362–375 (2020)

    Article  Google Scholar 

  13. Donahue, J., Krhenbühl, P., Darrell, T.: Adversarial feature learning. arXiv:1605.09782 (2016)

  14. Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv:1511.06434 (2016)

  15. Long, J., Shelhamer, E., Darrell, T.: Fully convolutional networks for semantic segmentation. arXiv:1411.4038 (2015)

Download references

Acknowledgement

This research was funded by the National Natural Science Foundation of China: (No: 61872203, No: 61802212), the Shandong Provincial Natural Science Foundation: (No: ZR2019BF017, No: ZR2020MF054), Jinan City ‘20 universities’ Funding Projects (No: 2019GXRC031, No: 2020GXRC056), Provincial Education Reform Projects: (No: Z2020042), School-level teaching reform project (NO: 201804), and School-level key project (NO: 2020zd24).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bing Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ma, B., Wang, Y., Wang, C., Li, J., Han, B., Cui, X. (2022). Perceptual Image Hashing with Bidirectional Generative Adversarial Networks for Copy Detection. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2022. Communications in Computer and Information Science, vol 1588. Springer, Cham. https://doi.org/10.1007/978-3-031-06764-8_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06764-8_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06763-1

  • Online ISBN: 978-3-031-06764-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics