Skip to main content

2024 | OriginalPaper | Buchkapitel

An Image Perceptual Hashing Algorithm Based on Convolutional Neural Networks

verfasst von : Meihong Yang, Baolin Qi, Yongjin Xian, Jian Li

Erschienen in: Digital Forensics and Watermarking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The conventional perceptual hashing algorithms are constrained to a singular global feature extraction algorithm and lack efficient scalability adaptation. To address this problem, an image-perceptual hashing algorithm based on convolutional neural networks is proposed in this paper. First of all, the entire image is convolved by the backbone network to obtain a feature map. The Region Proposal Network (RPN) is employed to generate multiple-sized proposal frames at each location by using sliding windows. Considering the complexity and diversity of the object, proposal boxes of various sizes and shapes are formulated, and the local features are comprehensively exploited in an image, thereby, generating a perceptual hash code that can represent the semantic features of an image strongly. Moreover, The Mean Square Error (MSE) loss is incorporated into the optimization process to evaluate the coincidence between the proposal frame and the actual frame, generating more representative hash codes. Finally, an image perceptual hash code with high intuitive features can be formulated through iterative training of the proposed convolutional neural networks. Extensive experimental results demonstrate that the proposed image perceptual hashing algorithm based on a convolutional neural network surpasses other state-of-the-art methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ma, B., Shi, Y.Q.: A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forensics Secur. 11(9), 1914–1927 (2016)CrossRef Ma, B., Shi, Y.Q.: A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forensics Secur. 11(9), 1914–1927 (2016)CrossRef
2.
Zurück zum Zitat Ma, B., Chang, L.L., Wang, C.P., et al.: Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping. Sig. Process. 172, 107544 (2020)CrossRef Ma, B., Chang, L.L., Wang, C.P., et al.: Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping. Sig. Process. 172, 107544 (2020)CrossRef
3.
Zurück zum Zitat Srivastava, M., Siddiqui, J., et al.: Local binary pattern based technique for content based image copy detection. In: 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and Its Control (PARC), pp. 374–377. IEEE, Piscataway (2020) Srivastava, M., Siddiqui, J., et al.: Local binary pattern based technique for content based image copy detection. In: 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and Its Control (PARC), pp. 374–377. IEEE, Piscataway (2020)
4.
Zurück zum Zitat Qin, C., Liu, E.L., Feng, G.R., et al.: Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints. IEEE Trans. Circ. Syst. Video Technol. 31(11), 4523–4537 (2020)CrossRef Qin, C., Liu, E.L., Feng, G.R., et al.: Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints. IEEE Trans. Circ. Syst. Video Technol. 31(11), 4523–4537 (2020)CrossRef
5.
Zurück zum Zitat Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proceedings of 3rd IEEE International Conference on Image Processing, vol. 3, pp. 227–230. IEEE, Piscataway (2002) Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proceedings of 3rd IEEE International Conference on Image Processing, vol. 3, pp. 227–230. IEEE, Piscataway (2002)
6.
Zurück zum Zitat Bin, M.A., Yi-li, W.A.N.G., Jian, X.U., et al.: An image perceptual hash algorithm based on bidirectional generative adversarial network. Acta Electron. Sin. 51(5), 1405–1412 (2023) Bin, M.A., Yi-li, W.A.N.G., Jian, X.U., et al.: An image perceptual hash algorithm based on bidirectional generative adversarial network. Acta Electron. Sin. 51(5), 1405–1412 (2023)
7.
Zurück zum Zitat Zhao, Y., Yuan, X.R.: Perceptual image hashing based on color structure and intensity gradient. IEEE Access 8, 26041–26053 (2020)CrossRef Zhao, Y., Yuan, X.R.: Perceptual image hashing based on color structure and intensity gradient. IEEE Access 8, 26041–26053 (2020)CrossRef
8.
Zurück zum Zitat Tang, Z.J., Zhang, X.Q., et al.: Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forensics Secur. 11(1), 200–214 (2015)CrossRef Tang, Z.J., Zhang, X.Q., et al.: Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forensics Secur. 11(1), 200–214 (2015)CrossRef
9.
Zurück zum Zitat Srivastava, M., Siddiqui, J., Ali, M.A.: Robust image hashing based on statistical features for copy detection. In: 2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UP-CON), pp. 490–495. IEEE, Piscataway (2017) Srivastava, M., Siddiqui, J., Ali, M.A.: Robust image hashing based on statistical features for copy detection. In: 2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UP-CON), pp. 490–495. IEEE, Piscataway (2017)
11.
Zurück zum Zitat Yuan, X.R., Zhao, Y.: Perceptual image hashing based on three-dimensional global features and image energy. IEEE Access 9, 49325–49337 (2021)CrossRef Yuan, X.R., Zhao, Y.: Perceptual image hashing based on three-dimensional global features and image energy. IEEE Access 9, 49325–49337 (2021)CrossRef
12.
Zurück zum Zitat Hosny, K.M., Khedr, Y.M., Khedr, W.I., et al.: Robust image hashing using exact Gaussian-Hermite moments. IET Image Process. 12(12), 2178–2185 (2018)CrossRef Hosny, K.M., Khedr, Y.M., Khedr, W.I., et al.: Robust image hashing using exact Gaussian-Hermite moments. IET Image Process. 12(12), 2178–2185 (2018)CrossRef
13.
Zurück zum Zitat Ouyang, J., Liu, Y.Z., Shu, H.Z.: Robust hashing for image authentication using SIFT feature and quaternion Zernike moments. Multimedia Tools Appl. 76(2), 2609–2626 (2017)CrossRef Ouyang, J., Liu, Y.Z., Shu, H.Z.: Robust hashing for image authentication using SIFT feature and quaternion Zernike moments. Multimedia Tools Appl. 76(2), 2609–2626 (2017)CrossRef
14.
Zurück zum Zitat Wang, X.F., Xue, J.R., Zheng, Z.Q., et al.: Image forensic signature for content authenticity analysis. J. Vis. Commun. Image Representation 23(5), 782–797 (2012)CrossRef Wang, X.F., Xue, J.R., Zheng, Z.Q., et al.: Image forensic signature for content authenticity analysis. J. Vis. Commun. Image Representation 23(5), 782–797 (2012)CrossRef
16.
Zurück zum Zitat Tang, Z.J., Huang, L.Y., Zhang, X.Q., et al.: Robust image hashing based on color vector angle and Canny operator. AEU-Int. J. Electron. Commun. 70(6), 833–841 (2016)CrossRef Tang, Z.J., Huang, L.Y., Zhang, X.Q., et al.: Robust image hashing based on color vector angle and Canny operator. AEU-Int. J. Electron. Commun. 70(6), 833–841 (2016)CrossRef
17.
Zurück zum Zitat Vadlamudi, L.N., Vaddell, R.P.V., Devara, V.: Robust image hashing using SIFT feature points and DWT approximation coefficients. ICT Express 4(3), 154–159 (2018)CrossRef Vadlamudi, L.N., Vaddell, R.P.V., Devara, V.: Robust image hashing using SIFT feature points and DWT approximation coefficients. ICT Express 4(3), 154–159 (2018)CrossRef
18.
Zurück zum Zitat Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Video Technol. 11(2), 153–168 (2001)MathSciNetCrossRef Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Video Technol. 11(2), 153–168 (2001)MathSciNetCrossRef
19.
Zurück zum Zitat Huang, Z.Q., Liu, S.G.: Perceptual image hashing with texture and invariant vector distance for copy detection. IEEE Trans. Multimedia 23, 15161529 (2020) Huang, Z.Q., Liu, S.G.: Perceptual image hashing with texture and invariant vector distance for copy detection. IEEE Trans. Multimedia 23, 15161529 (2020)
20.
Zurück zum Zitat Swaminathan, A., Mao, Y.N., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(2), 215–230 (2006)CrossRef Swaminathan, A., Mao, Y.N., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(2), 215–230 (2006)CrossRef
21.
Zurück zum Zitat Qin, C., Chang, C.C., Tsou, P.L.: Robust image hashing using non-uniform sampling in discrete Fourier domain. Digit. Sig. Proc. 23(2), 578–585 (2013)MathSciNetCrossRef Qin, C., Chang, C.C., Tsou, P.L.: Robust image hashing using non-uniform sampling in discrete Fourier domain. Digit. Sig. Proc. 23(2), 578–585 (2013)MathSciNetCrossRef
22.
Zurück zum Zitat Huang, Z.Q., Tang, Z.J., Zhang, X.Q., et al.: Perceptual image hashing with locality preserving projection for copy detection. IEEE Trans. Dependable Secure Comput. 20(1), 463–477 (2023)CrossRef Huang, Z.Q., Tang, Z.J., Zhang, X.Q., et al.: Perceptual image hashing with locality preserving projection for copy detection. IEEE Trans. Dependable Secure Comput. 20(1), 463–477 (2023)CrossRef
23.
Zurück zum Zitat Tang, Z.J., Lao, H., Zhang, X.Q., et al.: Robust image hashing via DCT and LLE. Comput. Secur. 62, 133–148 (2016)CrossRef Tang, Z.J., Lao, H., Zhang, X.Q., et al.: Robust image hashing via DCT and LLE. Comput. Secur. 62, 133–148 (2016)CrossRef
24.
Zurück zum Zitat Zhu, X.F., Li, X.L., Zhang, S.C., et al.: Graph PCA hashing for similarity search. IEEE Trans. Multimedia 19(9), 2033–2044 (2017)CrossRef Zhu, X.F., Li, X.L., Zhang, S.C., et al.: Graph PCA hashing for similarity search. IEEE Trans. Multimedia 19(9), 2033–2044 (2017)CrossRef
25.
Zurück zum Zitat Ren, S., et al.: Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39(6), 1137–1149 (2017)CrossRef Ren, S., et al.: Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39(6), 1137–1149 (2017)CrossRef
Metadaten
Titel
An Image Perceptual Hashing Algorithm Based on Convolutional Neural Networks
verfasst von
Meihong Yang
Baolin Qi
Yongjin Xian
Jian Li
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2585-4_7

Premium Partner