Skip to main content
Log in

A novel approach to detecting duplicate images using multiple hash tables

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a new duplicate image detection scheme that adopts multiple hash tables in a novel way for quick image matching and, consequently, fast duplicate detection. The proposed scheme contains two phases: the feature generation phase and the duplication inspection phase. The former phase extracts the features of images that need protection and transforms them into key-value pairs, which are stored in the slots of multiple hash tables. When a possibly duplicated image needs to be examined, the latter phase hashes the features of the suspect image into the corresponding slots of the multiple hash tables and determines if the suspect image is a duplicate one. The execution time of the scheme is relatively short thanks to the unique design of the multiple hash tables. The experimental results show that the proposed scheme obtained satisfactory results both on the recall and precision rates, hence demonstrating it can effectively identify duplicate images including digitally modified copies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Bay H, Ess A, Tuytelaars T, Van Gool L (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110(3):346–359

    Google Scholar 

  2. Berrani SA, Amsaleg L, Gros P (2003) Robust content-based image searches for copyright protection. In: Proceedings of the First ACM International Workshop on Multimedia Databases (MMDB’03), pp 70–77. doi:10.1145/951676.951690

  3. Ghosh P, Gelasca ED, Ramakrisnan KR, Manjunath BS (2007) Duplicate image detection in large scale databases. In: Chandra B, Murthy CA (ed) Advances in Intelligent Information Processing: Tools and Applications, World Scientific Publishing Company, pp 149–166

  4. Hash function, Wikipedia. http://en.wikipedia.org/wiki/Hash_function. Accessed 12 September 2013

  5. Hsieh SL, Tsai IJ, Yeh CP, Chang CM (2011) An image authentication scheme based on digital watermarking and image secret sharing. Multimedia Tools Appl 52(2–3):597–619

    Article  Google Scholar 

  6. Hsu CY, Lu CS, Pei SC (2009) Secure image hashing via minimum distortion estimation. In: Proceedings of the 16th IEEE International Conference on Image Processing (ICIP), pp 1281–1284. doi:10.1109/ICIP.2009.5413600

  7. Juan L, Gwun O (2009) A comparison of SIFT, PCA-SIFT, and SURF. Int J Image Process (IJIP) 3(4):143–152

    Google Scholar 

  8. Kekre HB, Mishra D (2010) Image retrieval using image hashing. J Sci Engg & Tech Mgt 2(1)

  9. Khan NY, McCane B, Wyvill G (2011) SIFT and SURF performance evaluation against various image deformations on benchmark dataset. In: Proceedings of 2011 International Conference on Digital Image Computing Techniques and Applications, pp 501–506. doi:10.1109/DICTA.2011.90

  10. Leutenegger S, Chli M, Siegwar RY (2011) BRISK: Binary robust invariant scalable keypoints, In: Proceedings of 2011 IEEE International Conference on Computer Vision, pp 2548–2555. doi:10.1109/ICCV.2011.6126542

  11. Ling H, Wang L, Zou F, Yan W (2011) Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching. Multimedia Tools Appl 52(2–3):551–568

    Article  Google Scholar 

  12. Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110

    Article  Google Scholar 

  13. Low resolution web-crawledmisc database used in WBIIS, test database used in SIMPLIcity paper. http://wang.ist.psu.edu/docs/related/. Accessed 20 September 2013

  14. Lu CS, Hsu CY (2005) Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multimedia Syst 11(2):159–173

    Article  Google Scholar 

  15. Mikolajczyk K, Schmid C (2005) A performance evaluation of local descriptors. IEEE Trans Pattern Anal Mach Intell 27(10):1615–1630

    Article  Google Scholar 

  16. Nikolaidis N, Pitas I (2009) Still image and video fingerprinting. In: Proceedings of the Seventh International Conference on Advances in Pattern Recognition (ICAPR'09), pp 3–8. doi:10.1109/ICAPR.2009.83

  17. Peker KA (2011) Binary SIFT: fast image retrieval using binary quantized SIFT features, In: Proceedings of the Ninth International Workshop on Content-Based Multimedia Indexing (CBMI), pp 217–222. doi:10.1109/CBMI.2011.5972548

  18. Polar coordinate system, Wikipedia. http://en.wikipedia.org/wiki/Polar_Coordinates. Accessed 12 September 2013

  19. Seo JS, Haitsma J, Kalker T, Yoo CD (2004) A robust image fingerprinting system using the Radon transform. Signal Process Image Commun 19(4):325–339

    Article  Google Scholar 

  20. Tang Z, Wang S, Zhang X, Wei W, Zhao Y (2011) Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools Appl 52(2–3):325–345

    Article  Google Scholar 

  21. The INRIA Copydays dataset. http://lear.inrialpes.fr/people/jegou/data.php#copydays. Accessed 20 September 2013

  22. The USC-SIPI Image Database. http://sipi.usc.edu/database/. Accessed 20 September 2013

  23. Voyatzis G, Pitas I (1996) Applications of toral automorphisms in image watermarking. In: Proceedings of 1996 International Conference on Image Processing (ICIP), vol. 2. pp 237–240. doi:10.1109/ICIP.1996.560753

  24. Wan YH, Yuan QL, Ji SM, He LM, Wang YL (2008) A survey of the image copy detection. In: Proceedings of IEEE Conference on Cybernetics and Intelligent Systems, pp 738–743. doi:10.1109/ICCIS.2008.4670942

  25. Wang SZ, Zhang XP (2007) Recent development of perceptual image hashing. J Shanghai Univ 11:323–331

    Article  MATH  Google Scholar 

  26. Wu M, Lin C, Chang C (2005) Image copy detection with rotating tolerance. In: Proceedings of International Conference on Computational Intelligence and Security • Lecture Notes in Computer Science. vol 3801. Springer, Heidelberg, pp 464–469. doi:10.1007/11596448_68

  27. Yao J, Wang X, Wang R (2011) Copy image detection based on local keypoints, In: Proceedings of 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR), pp 258–262. doi:10.1109/SoCPaR.2011.6089117

  28. Zhan RX, Chau KY, Lu ZM, Liu BB, Ip WH (2008) Robust image hashing for image authentication based on DCT-DWT composite domain, In: Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA'08), vol 2. pp 119–122. doi:10.1109/ISDA.2008.66

  29. Zhao W, Ngo CW (2009) Scale-rotation invariant pattern entropy for keypoint-based near-duplicate detection. IEEE Trans Image Process 18(2):412–423

    Article  MathSciNet  Google Scholar 

  30. Zhao Y, Wang S, Feng G, Tang Z (2010) A robust image hashing method based on Zernike moments. J Comput Inf Syst 6(3):717–725

    Google Scholar 

Download references

Acknowledgments

Financial support of this study by Tatung University, Taipei, Taiwan, under grant B100-I07-036 is gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shang-Lin Hsieh.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hsieh, SL., Chen, CC. & Chen, CR. A novel approach to detecting duplicate images using multiple hash tables. Multimed Tools Appl 74, 4947–4964 (2015). https://doi.org/10.1007/s11042-014-1857-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-1857-x

Keywords

Navigation