Академический Документы
Профессиональный Документы
Культура Документы
Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin 541004, PR China
Department of Computer Science, Guangxi Normal University, Guilin 541004, PR China
c
School of OpticalElectrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, PR China
d
Network Center, Guangxi Normal University, Guilin 541004, PR China
b
a r t i c l e
i n f o
Article history:
Available online 9 May 2015
Keywords:
Image hashing
Robust hashing
Locally linear embedding
Data reduction
Secondary image
CIE L a b color space
a b s t r a c t
Locally linear embedding (LLE) has been widely used in data processing, such as data clustering, video
identication and face recognition, but its application in image hashing is still limited. In this work,
we investigate the use of LLE in image hashing and nd that embedding vector variances of LLE are
approximately linearly changed by content-preserving operations. Based on this observation, we propose
a novel LLE-based image hashing. Specically, an input image is rstly mapped to a normalized matrix
by bilinear interpolation, color space conversion, block mean extraction, and Gaussian low-pass ltering.
The normalized matrix is then exploited to construct a secondary image. Finally, LLE is applied to the
secondary image and the embedding vector variances of LLE are used to form image hash. Hash similarity
is determined by correlation coecient. Many experiments are conducted to validate our eciency and
the results illustrate that our hashing is robust to content-preserving operations and reaches a good
discrimination. Comparisons of receiver operating characteristics (ROC) curve indicate that our hashing
outperforms some notable hashing algorithms in classication between robustness and discrimination.
2015 Elsevier Inc. All rights reserved.
1. Introduction
Nowadays, the popularization of imaging device, such as smart
cell phone, digital camera and scanner, provides us more and more
digital images. Consequently, ecient techniques are needed for
storing and retrieving hundreds of thousands of images. Meanwhile, it is easy to copy, edit and distribute images via powerful
tools and the Internet. Therefore, digital right management (DRM)
(image authentication, image forensics, copyright protection, etc.)
is in demand. All these practical issues lead to emergence of image
hashing. Image hashing is a novel technology for mapping input
image into a short string called image hash. It not only allows
us to retrieve images from large-scale database, but also can be
applied to DRM. In fact, it has been widely used in image authentication [1], digital watermarking [2], image copy detection, tamper
detection, image indexing [3], image retrieval, image forensics [4],
and image quality assessment [5].
Generally, image hashing has two basic properties [68]. The
rst one is perceptual robustness. It requires that, for those visually identical images, image hashing should generate the same
or very similar image hashes no matter whether their digital rep-
resentations are the same or not. This means that image hashing
must be robust against content-preserving operations, such as JPEG
compression, brightness adjustment, contrast adjustment, watermark embedding and image scaling. The second property is called
discrimination. This implies that, image hashing should extract different hashes from different images. In other words, similarity between hashes of different images should be small enough. Note
that the two properties contradict with each other [8]. The rst
property requires robustness under small perturbations, whereas
the second property amounts to minimization of collision probability for images with different contents. High performance algorithms should reach a good trade-off between the two properties.
In addition to the basic properties, image hashing should have
another property when it is applied to specic applications. For
example, it should be key-dependent for image authentication [9].
Due to the wide use of image hashing, many researchers have
paid attention to hashing techniques. For example, Venkatesan
et al. [10] exploited statistics of discrete wavelet transform (DWT)
coecients to generate image hashes. This hashing is robust to
JPEG compression and small-angle rotation, but sensitive to gamma
correction and contrast adjustment. Lefebvre et al. [11] pioneered
the use of Radon transform (RT) to hash extraction. This scheme
can resist geometric transform, such as rotation and scaling, but
its discriminative capability is limited. Kozat et al. [12] viewed images and attacks as a sequence of linear operators and presented
18
L =
a = 500 f ( X 1 / X 0 ) f (Y 1 /Y 0 )
(2)
b = 200 f (Y 1 /Y 0 ) f ( Z 1 / Z 0 )
(1)
(3)
f (t ) =
t 1/3 ,
if t > 0.008856
7.787t + 16/116, otherwise
(4)
and X 1 , Y 1 and Z 1 are the CIE XYZ tristimulus values [24], which
are calculated by the equation.
X1
0.4125 0.3576 0.1804
R
Y 1 = 0.2127 0.7152 0.0722 G
B
0.0193 0.1192 0.9502
Z1
(5)
where R, G and B are the red, blue and green components of each
image pixel, respectively.
Next, the L component is divided into non-overlapping blocks
with a small size s1 s1 . For simplicity, let M be the integral multiple of s1 , and M 1 = M /s1 . Thus, to make an initial compression,
we calculate block mean and use these means to construct a feature matrix as follows.
1,1
2,1
F=
...
1,2
2,2
...
M 1 ,1 M 1 ,2
... 1, M 1
... 2, M 1
...
...
... M 1 , M 1
(6)
where i , j is the mean of the block in the i-th row and the j-th
column of the L component (1 i M 1 , 1 j M 1 ). This operation not only achieves initial compression, but also makes our
19
G (1 ) ( i , j )
G ( i , j ) = (1 )
(i , j )
i
jG
(7)
G (1 ) ( i , j ) = e
(i 2 + j 2 )
2 2
(8)
X = [x1 , x2 , . . . , x N ]
(9)
Note that, during block selection, there can exist overlapping region between blocks. However, the same selected blocks should be
discarded since the same vectors are not expected in the secondary
image. Compared with the input image, the secondary image has
fewer columns. As column number is equal to vector number that
20
D
U (xi , x j ) =
2
xi (l) x j (l)
(10)
l =1
where xi (l) and x j (l) are the l-th elements of xi and x j , respectively. Thus, those vectors corresponding to the K smallest distances are the K nearest neighbors of xi .
(2) Weight computation. Calculate the weight matrix W =
( W i , j )N K . The weight matrix can best linearly reconstruct xi from
its nearest neighbors, and the reconstruction errors are computed
by the following cost function .
(W) =
2
N
xi
W
x
i
,
j
j
i =1
d
1
d1
y i (l) i
2
1
(13)
l =1
i =
y i (l)
(14)
l =1
c (i ) = Round
i2
1000
h = h(1), h(2), . . . , h( N )
(17)
S (h1 , h2 ) =
(15)
2
l=1 [h 1 (l) m1 ]
2
l=1 [h 2 (l) m2 ]
+ s
(18)
(12)
i2 =
(16)
2
N
(Y) =
W i , j y j
yi
h (i ) = c P [i ]
(11)
i =1
we can set a secret key as the seed of pseudo-random generator and create N random numbers. Then, we sort these N random
numbers and use an array P [ N ] to record the original positions of
the sorted elements. Therefore, the i-th hash element is obtained
by the below equation.
21
Operation
Parameter
Parameter setting
Number of
operations
Photoshop
Photoshop
MATLAB
MATLAB
MATLAB
MATLAB
StirMark
StirMark
StirMark
StirMark
Brightness adjustment
Contrast adjustment
Gamma correction
3 3 Gaussian low-pass ltering
Speckle noise
Salt and pepper noise
JPEG compression
Watermark embedding
Image scaling
Rotation, cropping and rescaling
Photoshops scale
Photoshops scale
10, 20
10, 20
4
4
4
8
10
10
8
10
6
12
Standard deviation
Variance
Density
Quality factor
Strength
Ratio
Angle in degree
Total
identical versions of these test images. The adopted digital operations include brightness adjustment, contrast adjustment, gamma
correction, 3 3 Gaussian low-pass ltering, speckle noise, salt
and pepper noise, JPEG compression, watermark embedding, image scaling, and the operation of rotation, cropping and rescaling.
For the operation of rotation, cropping and rescaling, each test image is rstly rotated, the rotated version is then cropped to remove
those padded pixels introduced by rotation, and the cropped version is nally resized to the original size of the test image. Detailed
parameter settings of each operation are listed in Table 1. It is observed from Table 1 that total number of the used operations is 76.
This means that each test image has 76 visually similar versions.
Therefore, there are (8 + 37) 76 = 3420 pairs of visually similar
images.
We extract image hashes of the test images and their similar versions, calculate similarity between each pair of hashes, and
nd that our hashing is robust to the used digital operations. For
space limitation, only the results of 8 typical standard color im-
76
ages are plotted here. Fig. 6 presents the robustness results under
various digital operations. Clearly, all results are bigger than 0.70.
To demonstrate the robustness performance of our hashing on a
big dataset, we calculate statistics of correlation coecients based
on the above mentioned 3420 pairs of visually similar images.
The results are listed in Table 2. It is observed from these results
that, the means of correlation coecients for all digital operations
are bigger than 0.87, and all standard deviations are very small.
Note that correlation coecient is an effective metric for measuring the linearity. These big correlation coecients empirically
verify that the variances of LLE results are approximately linearly
changed by content-preserving operations. In addition, the minimum values of correlation coecients for all digital operations are
bigger than 0.75, except the operation of rotation, cropping and
rescaling. The minimum value of rotation, cropping and rescaling
is 0.4572, which is much smaller than those values of other operations. This is because it is a combinational operation, which causes
more changes in the attacked images than other operations. Con-
22
23
Fig. 6. (continued)
Table 2
Statistics of correlation coecients based on 3420 pairs of similar images.
Operation
Maximum
Minimum
Mean
Standard
deviation
Brightness adjustment
Contrast adjustment
Gamma correction
3 3 Gaussian low-pass ltering
Speckle noise
Salt and pepper noise
JPEG compression
Watermark embedding
Image scaling
Rotation, cropping and rescaling
1
0.9977
1
1
0.9986
0.9983
0.9999
1
0.9980
0.9914
0.8426
0.8457
0.7765
0.9198
0.8677
0.8173
0.9031
0.7569
0.8626
0.4572
0.9694
0.9667
0.9713
0.9825
0.9706
0.9701
0.9691
0.9765
0.9765
0.8717
0.0240
0.0227
0.0259
0.0160
0.0218
0.0219
0.0200
0.0269
0.0269
0.0781
ements, where the x-axis is the value of hash element and the
y-axis is its frequency. It is found that the minimum value is 4
and the maximum value is 1666. This means that storage of hash
element only requires 11 bits, which can represent integers ranging from 0 to 211 1 = 2047. Therefore, the length of our hash is
50 11 = 550 bits, reaching a reasonable short length. As a reference, the lengths of the SVDSVD hashing [12], the ZM-based
hashing [21], and the CAV-DWT hashing [22] are 1600 digits, 560
bits, and 960 bits, respectively.
To evaluate the effect of parameter settings on our hash performances, we use different parameter values to validate robustness
and discrimination. To make visual comparisons between the results of different settings, the notable tool, i.e., receiver operating
24
Table 3
Detection performances under different thresholds.
Threshold
0.90
0.80
0.75
0.70
0.60
0.55
0.50
0.45
89.91%
97.16%
98.92%
99.53%
99.91%
99.94%
99.97%
100%
0
0
0
0
0.05%
0.12%
0.37%
0.87%
P1 =
P2 =
n1
(19)
N1
n2
(20)
N2
Table 4
Time comparison under different K values.
K
15
25
30
35
40
0.62
0.61
0.61
0.61
0.62
0.64
Fig. 10. ROC curve comparisons under different d values when K = 30.
25
Table 5
Time comparison under different d values.
d
25
30
35
40
0.62
0.61
0.61
0.62
26
Table 6
Performance comparisons among different algorithms.
Performance
Algorithm
Classication
Computational time (second)
Hash length (bit)
GFLVQ hashing
RTDCT hashing
LLE-based hashing
CVADWT hashing
Our hashing
Moderate
0.42
120
Bad
3.04
240
Moderate
0.04
300
Good
0.27
960
Best
0.61
550
[15] Z. Tang, S. Wang, X. Zhang, W. Wei, S. Su, Robust image hashing for tamper
detection using non-negative matrix factorization, J. Ubiquitous Convergence
Technol. 2 (1) (2008) 1826.
[16] Y. Ou, K.H. Rhee, A key-dependent secure image hashing scheme by using
Radon transform, in: Proc. of the IEEE International Symposium on Intelligent
Signal Processing and Communication Systems, 2009, pp. 595598.
[17] L. Kang, C. Lu, C. Hsu, Compressive sensing-based image hashing, in: Proc.
of IEEE International Conference on Image Processing, Cairo, Egypt, 2009,
pp. 12851288.
[18] R. Sun, X. Yan, Z. Ding, Robust image hashing using locally linear embedding,
in: Proc. of the 2011 International Conference on Computer Science and Service
System (CSSS), 2011, pp. 715718.
[19] Z. Tang, S. Wang, X. Zhang, W. Wei, Structural feature-based image hashing
and similarity metric for tampering detection, Fundam. Inform. 106 (1) (2011)
7591.
[20] Y. Li, Z. Lu, C. Zhu, X. Niu, Robust image hashing based on random Gabor ltering and dithered lattice vector quantization, IEEE Trans. Image Process. 21 (4)
(2012) 19631980.
[21] Y. Zhao, S. Wang, X. Zhang, H. Yao, Robust hashing for image authentication
using Zernike moments and local features, IEEE Trans. Inf. Forensics Secur. 8 (1)
(2013) 5563.
[22] Z. Tang, Y. Dai, X. Zhang, L. Huang, F. Yang, Robust image hashing via colour
vector angles and discrete wavelet transform, IET Image Process. 8 (3) (2014)
142149.
[23] R.C. Gonzalez, R.E. Woods, Digital Image Processing, 3rd edition, Prentice Hall,
2007.
[24] W. Burger, M.J. Burge, Principles of Digital Image Processing: Core Algorithm,
Springer, London, 2009.
[25] S.T. Roweis, L.K. Saul, Nonlinear dimensionality reduction by locally linear embedding, Science 290 (2000) 23232326.
[26] I.T. Jolliffe, Principal Component Analysis, Springer-Verlag, New York, 1989.
[27] T. Cox, M. Cox, Multidimensional Scaling, Chapman & Hall, London, 1994.
[28] S. Pang, D. Kim, S.Y. Bang, Face membership authentication using SVM classication tree generated by membership-based LLE data partition, IEEE Trans.
Neural Netw. 16 (2) (2005) 436446.
[29] X. Nie, J. Qiao, J. Liu, J. Sun, X. Li, W. Liu, LLE-based video hashing for video
identication, in: Proc. of the IEEE 10th International Conference on Signal Processing (ICSP), 2010, pp. 18371840.
[30] H. Li, X. Li, Gait analysis using LLE, in: Proceedings of the IEEE 7th International
Conference on Signal Processing (ICSP), vol. 2, 2004, pp. 14231426.
[31] A. Hadid, O. Kouropteva, M. Pietikainen, Unsupervised learning using locally
linear embedding: experiments with face pose analysis, in: Proc. of the 16th
International Conference on Pattern Recognition, vol. 1, 2002, pp. 111114.
[32] S.T. Roweis, L.K. Saul, An introduction to locally linear embedding [online].
Available: http://www.cs.nyu.edu/~roweis/lle/papers/lleintroa4.pdf, 2001.
[33] LLE code page [online]. Available: http://www.cs.nyu.edu/~roweis/lle/code.html,
2013.
[34] USC-SIPI Image Database [online], Available: http://sipi.usc.edu/database/, 2007.
[35] F.A.P. Petitcolas, Watermarking schemes evaluation, IEEE Signal Process. Mag.
17 (5) (2000) 5864.
[36] Ground Truth Database [online]. Available: http://www.cs.washington.edu/
reseach/imagedatabase/groundtruth/, 2008.
[37] T. Fawcett, An introduction to ROC analysis, Pattern Recognit. Lett. 27 (8) (2006)
861874.
Zhenjun Tang received the B.S. and M.Eng. degrees from Guangxi Normal University, Guilin, P.R.
China, in 2003 and 2006, respectively, and the Ph.D.
degree from Shanghai University, Shanghai, P.R. China,
in 2010. He is now a professor with the Department
of Computer Science, Guangxi Normal University. His
research interests include image processing and multimedia security. He has contributed more than 30 papers in international journals such as IEEE Transactions
on Knowledge and Data Engineering, Signal Processing, Applied Mathematics
and Computation, IET Image Processing, Fundamenta Informaticae, Multimedia
Tools and Applications, Imaging Science Journal, Applied Mathematics & Information Sciences, AE-International Journal of Electronics and Communications,
and Optik-International Journal for Light and Electron Optics. He holds three
China patents. He is a reviewer of some reputable journals such as IEEE
Transactions on Image Processing, IEEE Transactions on Information Forensics
and Security, IEEE Transactions on Multimedia, IEEE Transactions on Circuits
and Systems for Video Technology, Signal Processing, Digital Signal Processing,
IET Image Processing, IET Computer Vision, Neurocomputing, Multimedia Tools
and Applications, and Imaging Science Journal.
27