Browse > Article

Robust Hierarchical GLOCAL Hash Generation based on Image Histogram  

Choi, Yong-Soo (Graduate School of Information Management & Security, Korea University)
Kim, Hyoung-Joong (Graduate School of Information Management & Security, Korea University)
Lee, Dal-Ho (Department of Electronic Engineering, Kyungwon University)
Publication Information
Abstract
Recently, Web applications, such as Stock Image and Image Library, are developed to provide the integrated management for user's images. Image hash techniques are used for the image registration, management and retrieval as the identifier and many researches have been performed to raise the hash performance. This paper proposes GLOCAL image hashing method utilizing the hierarchical histogram which based on histogram bin population method. So far, many researches have proven that image hashing techniques based on histogram are robust image processing and geometrical attack. We modified existing image hashing method developed by our research team. The main idea is that it makes more fluent hash string if we have histogram bin of specific length as shown in the body of paper. Finally, we can raise the magnitude of hash string within same context or feature and strengthen the robustness of hash.
Keywords
Image Hash; Hierarchical Hash Generation; Robustness; Statistical Hypothesis Testing;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Suleyman S. Kozat, and R. Venkatesan, M. Kivanc Mihcak, "Robust Perceptual Image Hashing via Matrix Invariants," Proceedings of International Conference on Image Processing, pp.3443-3446, 2004.
2 A. Swaminathan, Y. Mao, and M. Wu, "Robust and secure image hashing," IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, pp. 215-230, June 2006.   DOI   ScienceOn
3 Z. J. Tang, S. Z. Wang, X. P. Zhang, W. M. Wei and S. J. Su, "Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization," Journal of Ubiquitous Convergence Technology, Vol.2 No.1, pp. 18-26, 2008.
4 E. Y. Chang, C. Li, J. Z. Wang, P. Mork, and G. Wiederhold, "Searching near replicas of images via clustering," SPIE Multimedia Storage and Archiving Systems VI, pp. 281-292, 1999.
5 Y. Ke, R. Sukthankar, and L. Huston, "An efficient parts-based near-duplicate and sub-image retrieval system," Proceedings of the ACM International Conference on Multimedia, pp. 869-876, 2004.
6 Li Chen and F. W. M. Stentiford, "Comparison of near-duplicate image matching," European Conference on Visual Media Production, pp. 38-42, 2006.
7 J. J. Foo, J. Zobel, R. Sinha, and S. M. M. Tahaghoghi, "Detection of near duplicate images versions for web search," Proceedings of the ACM International Conference on Image and Video Retrieval, 2007.
8 A. W. M. Smeulders, M. Worring, S. Santini, A. Gupta, and R. Jain, "Content based image retrieval at the end of the early years," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 22, pp. 1349-1380, 2000.   DOI   ScienceOn
9 B. Wang, Z. Li, M. Li, and W.-Y. Ma, "Large-scale duplicate detection for Web image search," IEEE International Conference on Multimedia and Expo, pp. 353-356, 2006.
10 M. Yang, G. Qiu, J. Huang, and D. Elliman, "Near-duplicate image recognition and content- based image retrieval using adaptive hierarchical geometric centroids," International Conference on Pattern Recognition, pp. 958-961, 2006.
11 S. Xiang, H. J. Kim, and J. Huang, "Histogram-based image hashing scheme robust against geometric deformations," Proceedings of the ACM Multimedia and Security Workshop, pp. 121-128, 2007.
12 M. Johnson and K. Ramchandran, "Dither-Based Secure Image Hashing Using Distributed Coding," Proc. IEEE Int. Conf. Image Processing, September 2003.
13 K. Mikolajczyk and C. Schmid, "A performance evaluation of local descriptors," Proceedings of the Computer Vision and Pattern Recognition, pp. 257-263, 2003.
14 H. J. Kim, S. Y. Kim, and H. Kim, "A new image hash computation method," International Workshop on Ubiquitous Convergence Technology, 2007.
15 J. Fridrich, D. Soukal, and J. Lukas, "Detection of copymove forgery in digital images" Proceedings of Digital Forensic Research Workshop, 2003.
16 이석환, 권기룡, "키 기반 블록 표면 계수를 이용한 강인한 3D 모델 해싱," 전자공학회논문지, 제47권 CI편, 제 1호, 1-14쪽, 2010년.
17 V. Monga and M.K. Mhcak, "Robust and Secure Image Hashing via Non-Negative Matrix Factorizations," IEEE Transactions on Information Forensics and Security, Vol. 27, No. 3, pp. 379-391, 2005.
18 N. L. Johnson, S. Kotz, and N. Balakrishnan, "Continuous Uni-variate Distributions," John Wiley \& Sons Inc, vol 2, New York, 1995.