Abstract
This paper presents a new duplicate image detection scheme that adopts multiple hash tables in a novel way for quick image matching and, consequently, fast duplicate detection. The proposed scheme contains two phases: the feature generation phase and the duplication inspection phase. The former phase extracts the features of images that need protection and transforms them into key-value pairs, which are stored in the slots of multiple hash tables. When a possibly duplicated image needs to be examined, the latter phase hashes the features of the suspect image into the corresponding slots of the multiple hash tables and determines if the suspect image is a duplicate one. The execution time of the scheme is relatively short thanks to the unique design of the multiple hash tables. The experimental results show that the proposed scheme obtained satisfactory results both on the recall and precision rates, hence demonstrating it can effectively identify duplicate images including digitally modified copies.
Similar content being viewed by others
References
Bay H, Ess A, Tuytelaars T, Van Gool L (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110(3):346–359
Berrani SA, Amsaleg L, Gros P (2003) Robust content-based image searches for copyright protection. In: Proceedings of the First ACM International Workshop on Multimedia Databases (MMDB’03), pp 70–77. doi:10.1145/951676.951690
Ghosh P, Gelasca ED, Ramakrisnan KR, Manjunath BS (2007) Duplicate image detection in large scale databases. In: Chandra B, Murthy CA (ed) Advances in Intelligent Information Processing: Tools and Applications, World Scientific Publishing Company, pp 149–166
Hash function, Wikipedia. http://en.wikipedia.org/wiki/Hash_function. Accessed 12 September 2013
Hsieh SL, Tsai IJ, Yeh CP, Chang CM (2011) An image authentication scheme based on digital watermarking and image secret sharing. Multimedia Tools Appl 52(2–3):597–619
Hsu CY, Lu CS, Pei SC (2009) Secure image hashing via minimum distortion estimation. In: Proceedings of the 16th IEEE International Conference on Image Processing (ICIP), pp 1281–1284. doi:10.1109/ICIP.2009.5413600
Juan L, Gwun O (2009) A comparison of SIFT, PCA-SIFT, and SURF. Int J Image Process (IJIP) 3(4):143–152
Kekre HB, Mishra D (2010) Image retrieval using image hashing. J Sci Engg & Tech Mgt 2(1)
Khan NY, McCane B, Wyvill G (2011) SIFT and SURF performance evaluation against various image deformations on benchmark dataset. In: Proceedings of 2011 International Conference on Digital Image Computing Techniques and Applications, pp 501–506. doi:10.1109/DICTA.2011.90
Leutenegger S, Chli M, Siegwar RY (2011) BRISK: Binary robust invariant scalable keypoints, In: Proceedings of 2011 IEEE International Conference on Computer Vision, pp 2548–2555. doi:10.1109/ICCV.2011.6126542
Ling H, Wang L, Zou F, Yan W (2011) Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching. Multimedia Tools Appl 52(2–3):551–568
Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110
Low resolution web-crawledmisc database used in WBIIS, test database used in SIMPLIcity paper. http://wang.ist.psu.edu/docs/related/. Accessed 20 September 2013
Lu CS, Hsu CY (2005) Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multimedia Syst 11(2):159–173
Mikolajczyk K, Schmid C (2005) A performance evaluation of local descriptors. IEEE Trans Pattern Anal Mach Intell 27(10):1615–1630
Nikolaidis N, Pitas I (2009) Still image and video fingerprinting. In: Proceedings of the Seventh International Conference on Advances in Pattern Recognition (ICAPR'09), pp 3–8. doi:10.1109/ICAPR.2009.83
Peker KA (2011) Binary SIFT: fast image retrieval using binary quantized SIFT features, In: Proceedings of the Ninth International Workshop on Content-Based Multimedia Indexing (CBMI), pp 217–222. doi:10.1109/CBMI.2011.5972548
Polar coordinate system, Wikipedia. http://en.wikipedia.org/wiki/Polar_Coordinates. Accessed 12 September 2013
Seo JS, Haitsma J, Kalker T, Yoo CD (2004) A robust image fingerprinting system using the Radon transform. Signal Process Image Commun 19(4):325–339
Tang Z, Wang S, Zhang X, Wei W, Zhao Y (2011) Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools Appl 52(2–3):325–345
The INRIA Copydays dataset. http://lear.inrialpes.fr/people/jegou/data.php#copydays. Accessed 20 September 2013
The USC-SIPI Image Database. http://sipi.usc.edu/database/. Accessed 20 September 2013
Voyatzis G, Pitas I (1996) Applications of toral automorphisms in image watermarking. In: Proceedings of 1996 International Conference on Image Processing (ICIP), vol. 2. pp 237–240. doi:10.1109/ICIP.1996.560753
Wan YH, Yuan QL, Ji SM, He LM, Wang YL (2008) A survey of the image copy detection. In: Proceedings of IEEE Conference on Cybernetics and Intelligent Systems, pp 738–743. doi:10.1109/ICCIS.2008.4670942
Wang SZ, Zhang XP (2007) Recent development of perceptual image hashing. J Shanghai Univ 11:323–331
Wu M, Lin C, Chang C (2005) Image copy detection with rotating tolerance. In: Proceedings of International Conference on Computational Intelligence and Security • Lecture Notes in Computer Science. vol 3801. Springer, Heidelberg, pp 464–469. doi:10.1007/11596448_68
Yao J, Wang X, Wang R (2011) Copy image detection based on local keypoints, In: Proceedings of 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR), pp 258–262. doi:10.1109/SoCPaR.2011.6089117
Zhan RX, Chau KY, Lu ZM, Liu BB, Ip WH (2008) Robust image hashing for image authentication based on DCT-DWT composite domain, In: Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA'08), vol 2. pp 119–122. doi:10.1109/ISDA.2008.66
Zhao W, Ngo CW (2009) Scale-rotation invariant pattern entropy for keypoint-based near-duplicate detection. IEEE Trans Image Process 18(2):412–423
Zhao Y, Wang S, Feng G, Tang Z (2010) A robust image hashing method based on Zernike moments. J Comput Inf Syst 6(3):717–725
Acknowledgments
Financial support of this study by Tatung University, Taipei, Taiwan, under grant B100-I07-036 is gratefully acknowledged.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hsieh, SL., Chen, CC. & Chen, CR. A novel approach to detecting duplicate images using multiple hash tables. Multimed Tools Appl 74, 4947–4964 (2015). https://doi.org/10.1007/s11042-014-1857-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-1857-x