ABSTRACT
Media hashing is an alternative approach to many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their poor resistance to geometric attacks. In this paper, a novel geometric distortion-invariant image hashing scheme, which can be employed to perform copy detection and content authentication of digital images, is proposed. Our major contributions are threefold: (i) mesh-based robust hashing function is proposed; (ii) sophisticated hash database for error-resilient and fast matching is constructed; and (iii) the application scalability of our scheme for content copy tracing and authentication is studied. In addition, we further investigate several media hashing issues, including robustness and discrimination, error analysis, and complexity, for the proposed image hashing system. Exhaustive experimental results obtained from benchmark attacks confirm the excellent performance of the proposed method.
- P. Bas, J. M. Chassery, and B. Macq, "Geometrically invariant watermarking using feature points," IEEE Trans. Image Processing Vol. 11, pp. 1014--1028, 2002.]] Google ScholarDigital Library
- E. Y. Chang, J. Z. Wang, C. Li, and G. Wiederhold, "RIME:A Replicated Image Detector for the World-Wide-Web," Proc. SPIE: Multimedia Storage and Archiving Systems Vol.III, 1998.]]Google Scholar
- E. Y. Chang, C. Li, J. Z. Wang, P. Mork, and G. Wiederhold, "Searching Near-Replicas of Images via Clustering," Proc. SPIE Symposium of Voice, Video, and Data Communications pp. 281--92, Boston, 1999.]]Google Scholar
- J. Dittmann, A. Steinmetz, and R. Steinmetz, "Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking ", Proc. IEEE Int. Conf. Multimedia Computing and Systems Italy, Vol. II, pp. 209--213, 1999.]] Google ScholarDigital Library
- J. Fridrich, "Visual Hash for Oblivious Watermarking," Proc. SPIE: Security and Watermarking of Multimedia Contents II , 2000.]]Google Scholar
- J. Fridrich and M. Goljan, "Robust Hash Functions for Digital Watermarking," Proc. IEEE Int. Conf. on Information Technology: Coding and Computing pp. 178--183, 2000.]] Google ScholarDigital Library
- IEEE Int. Conf. on Multimedia and Expo special session on Media Identification, J. Oostveen, C. S. Lu, and Q .Sun (co-organizers), June 2004.]]Google Scholar
- T. Kalker, "Applications and Challenges for Audio Fingerprinting, "Proc. 111th AES Convention, in the "Watermarking versus Fingerprinting" Workshop December 3, 2001.]]Google Scholar
- C. Kim, "Content-based Image Copy Detection," Signal Processing: Image Communication Vol. 18, pp. 169--184, 2003.]]Google ScholarCross Ref
- F. Lefebvre and B. Macq, "RA H : RAdon Soft Hash algorithm," Proc. European Signal Processing Conference Toulouse, France, 2002.]]Google Scholar
- F. Lefebvre, J. Czyz, and B. Macq, "A Robust Soft Hash Algorithm for Digital Image Signature," Proc. IEEE Int. Conf. on Image Proc., 2003.]]Google Scholar
- B. Li, E. Chang, and C. T. Wu, "DPF -- A Perceptual Distance Function for Image Retrieval," Proc. IEEE Int. Conf. on Image Processing 2002.]]Google Scholar
- C. Y. Lin and S. F. Chang, "Generating Robust Digital Signature for Image/Video Authentication," Proc. ACM Multimedia and Security Workshop UK, 1998.]]Google Scholar
- C. Y. Lin and S. F. Chang, "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation," IEEE Trans. on Circuits and Systems for Video Tech., Vol. 11, No. 2, pp. 153--168, 2001.]] Google ScholarDigital Library
- C. S. Lu and H. Y. Mark Liao, "Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant cheme," IEEE Trans. on Multimedia Vol. 5, No. 2, pp. 161--173, 2003.]] Google ScholarDigital Library
- C. S. Lu, "On the Security of Structural Information Extraction/Embedding for Images," Proc. IEEE Int. Symposium on Circuits and Systems Vancouver, Canada, 2004.]]Google Scholar
- C. S. Lu, C. Y. Hsu, S. W. Sun, and P. C. Chang, "Robust Mesh-based Hashing for Copy Detection and Tracing of Images," Proc. IEEE Int. Conf. on Multimedia and Expo: special session on Media Identification Taipei, Taiwan, 2004.]]Google Scholar
- S. Mallat and S. Zhong, "Characterization of Signals from Multiscale Edges," IEEE Trans. on Pattern Anal. and Machine Intell., Vol. 14, No. 7, pp. 710--732, 1992.]] Google ScholarDigital Library
- Y. Meng and E. Chang, "Image Copy Detection Using Dynamic Partial Function," Proc. SPIE Storage and Retrieval for Media Database Vol. 5021, pp. 176--186, 2003.]]Google Scholar
- M. K. Mihcak and R. Venkatesan, "New Iterative Geometric Methods for Robust Perceptual Image Hashing," Proc. ACM Workshop on Security and Privacy in Digital Rights Management Philadelphia, PA, 2001.]] Google ScholarDigital Library
- IEEE Int. Workshop on Multimedia Signal Processing (MMSP), special session on Media Recognition, Virgin Islands, USA, 2002.]]Google Scholar
- F. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on Copyright Marking Systems," Proc. Int. Workshop on Information Hiding LNC 1575, pp. 219--239, 1998.]] Google ScholarDigital Library
- F. Petitcolas, "Watermarking chemes Evaluation," IEEE Signal Processing Magazine Vol. 17, No. 5, pp. 58--64, 2000.]]Google ScholarCross Ref
- J. S. Seo, J. Haitsma, T. Kalker, and C. D. Yoo, "A Robust Image FIngerprinting system Using the Radon Transform," Signal Processing: Image Communication Vol. 19, pp. 325--339, 2004.]]Google ScholarCross Ref
- R. Venkatesan, S. M. Koon, M. H. Jakubowski, and P. Moulin, "Robust Image Hashing," Proc. IEEE Int. Conf. Image Processing 2000.]]Google Scholar
- Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity," IEEE Trans. on Image Processing Vol. 13, No. 4, pp. 600--612, 2004.]] Google ScholarDigital Library
Index Terms
- Geometric distortion-resilient image hashing system and its application scalability
Recommendations
A robust watermarking technique in geometric distortion of digital image
ICCSA'03: Proceedings of the 2003 international conference on Computational science and its applications: PartIIGenerally, existing watermarking techniques are fragile in geometric distortion and have difficulty in detecting artificial manipulation of digital data. In this paper, we propose a robust watermarking technique in geometric distortion of digital ...
Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication
Media hashing is an alternative approach to many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their limited resistance to geometric attacks. In this paper, a novel geometric ...
An image watermarking algorithm robust to geometric distortion
IWDW'02: Proceedings of the 1st international conference on Digital watermarkingDigital image watermark is an invisible mark embedded in an image that can be used for copyright protection. The current paper proposes a new watermarking scheme by improving image normalization based watermarking (INW). Image normalization is based on ...
Comments