skip to main content
10.1145/1022431.1022448acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Geometric distortion-resilient image hashing system and its application scalability

Authors Info & Claims
Published:20 September 2004Publication History

ABSTRACT

Media hashing is an alternative approach to many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their poor resistance to geometric attacks. In this paper, a novel geometric distortion-invariant image hashing scheme, which can be employed to perform copy detection and content authentication of digital images, is proposed. Our major contributions are threefold: (i) mesh-based robust hashing function is proposed; (ii) sophisticated hash database for error-resilient and fast matching is constructed; and (iii) the application scalability of our scheme for content copy tracing and authentication is studied. In addition, we further investigate several media hashing issues, including robustness and discrimination, error analysis, and complexity, for the proposed image hashing system. Exhaustive experimental results obtained from benchmark attacks confirm the excellent performance of the proposed method.

References

  1. P. Bas, J. M. Chassery, and B. Macq, "Geometrically invariant watermarking using feature points," IEEE Trans. Image Processing Vol. 11, pp. 1014--1028, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. Y. Chang, J. Z. Wang, C. Li, and G. Wiederhold, "RIME:A Replicated Image Detector for the World-Wide-Web," Proc. SPIE: Multimedia Storage and Archiving Systems Vol.III, 1998.]]Google ScholarGoogle Scholar
  3. E. Y. Chang, C. Li, J. Z. Wang, P. Mork, and G. Wiederhold, "Searching Near-Replicas of Images via Clustering," Proc. SPIE Symposium of Voice, Video, and Data Communications pp. 281--92, Boston, 1999.]]Google ScholarGoogle Scholar
  4. J. Dittmann, A. Steinmetz, and R. Steinmetz, "Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking ", Proc. IEEE Int. Conf. Multimedia Computing and Systems Italy, Vol. II, pp. 209--213, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Fridrich, "Visual Hash for Oblivious Watermarking," Proc. SPIE: Security and Watermarking of Multimedia Contents II , 2000.]]Google ScholarGoogle Scholar
  6. J. Fridrich and M. Goljan, "Robust Hash Functions for Digital Watermarking," Proc. IEEE Int. Conf. on Information Technology: Coding and Computing pp. 178--183, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. IEEE Int. Conf. on Multimedia and Expo special session on Media Identification, J. Oostveen, C. S. Lu, and Q .Sun (co-organizers), June 2004.]]Google ScholarGoogle Scholar
  8. T. Kalker, "Applications and Challenges for Audio Fingerprinting, "Proc. 111th AES Convention, in the "Watermarking versus Fingerprinting" Workshop December 3, 2001.]]Google ScholarGoogle Scholar
  9. C. Kim, "Content-based Image Copy Detection," Signal Processing: Image Communication Vol. 18, pp. 169--184, 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  10. F. Lefebvre and B. Macq, "RA H : RAdon Soft Hash algorithm," Proc. European Signal Processing Conference Toulouse, France, 2002.]]Google ScholarGoogle Scholar
  11. F. Lefebvre, J. Czyz, and B. Macq, "A Robust Soft Hash Algorithm for Digital Image Signature," Proc. IEEE Int. Conf. on Image Proc., 2003.]]Google ScholarGoogle Scholar
  12. B. Li, E. Chang, and C. T. Wu, "DPF -- A Perceptual Distance Function for Image Retrieval," Proc. IEEE Int. Conf. on Image Processing 2002.]]Google ScholarGoogle Scholar
  13. C. Y. Lin and S. F. Chang, "Generating Robust Digital Signature for Image/Video Authentication," Proc. ACM Multimedia and Security Workshop UK, 1998.]]Google ScholarGoogle Scholar
  14. C. Y. Lin and S. F. Chang, "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation," IEEE Trans. on Circuits and Systems for Video Tech., Vol. 11, No. 2, pp. 153--168, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. S. Lu and H. Y. Mark Liao, "Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant cheme," IEEE Trans. on Multimedia Vol. 5, No. 2, pp. 161--173, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. S. Lu, "On the Security of Structural Information Extraction/Embedding for Images," Proc. IEEE Int. Symposium on Circuits and Systems Vancouver, Canada, 2004.]]Google ScholarGoogle Scholar
  17. C. S. Lu, C. Y. Hsu, S. W. Sun, and P. C. Chang, "Robust Mesh-based Hashing for Copy Detection and Tracing of Images," Proc. IEEE Int. Conf. on Multimedia and Expo: special session on Media Identification Taipei, Taiwan, 2004.]]Google ScholarGoogle Scholar
  18. S. Mallat and S. Zhong, "Characterization of Signals from Multiscale Edges," IEEE Trans. on Pattern Anal. and Machine Intell., Vol. 14, No. 7, pp. 710--732, 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Y. Meng and E. Chang, "Image Copy Detection Using Dynamic Partial Function," Proc. SPIE Storage and Retrieval for Media Database Vol. 5021, pp. 176--186, 2003.]]Google ScholarGoogle Scholar
  20. M. K. Mihcak and R. Venkatesan, "New Iterative Geometric Methods for Robust Perceptual Image Hashing," Proc. ACM Workshop on Security and Privacy in Digital Rights Management Philadelphia, PA, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. IEEE Int. Workshop on Multimedia Signal Processing (MMSP), special session on Media Recognition, Virgin Islands, USA, 2002.]]Google ScholarGoogle Scholar
  22. F. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on Copyright Marking Systems," Proc. Int. Workshop on Information Hiding LNC 1575, pp. 219--239, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. F. Petitcolas, "Watermarking chemes Evaluation," IEEE Signal Processing Magazine Vol. 17, No. 5, pp. 58--64, 2000.]]Google ScholarGoogle ScholarCross RefCross Ref
  24. J. S. Seo, J. Haitsma, T. Kalker, and C. D. Yoo, "A Robust Image FIngerprinting system Using the Radon Transform," Signal Processing: Image Communication Vol. 19, pp. 325--339, 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  25. R. Venkatesan, S. M. Koon, M. H. Jakubowski, and P. Moulin, "Robust Image Hashing," Proc. IEEE Int. Conf. Image Processing 2000.]]Google ScholarGoogle Scholar
  26. Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity," IEEE Trans. on Image Processing Vol. 13, No. 4, pp. 600--612, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Geometric distortion-resilient image hashing system and its application scalability

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            MM&Sec '04: Proceedings of the 2004 workshop on Multimedia and security
            September 2004
            236 pages
            ISBN:1581138547
            DOI:10.1145/1022431

            Copyright © 2004 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 20 September 2004

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate128of318submissions,40%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader