Browse > Article
http://dx.doi.org/10.3837/tiis.2015.12.017

A Novel Perceptual Hashing for Color Images Using a Full Quaternion Representation  

Xing, Xiaomei (Communication & Information Security Lab, Institute of Big Data Technologies Shenzhen Graduate School, Peking University)
Zhu, Yuesheng (Communication & Information Security Lab, Institute of Big Data Technologies Shenzhen Graduate School, Peking University)
Mo, Zhiwei (Communication & Information Security Lab, Institute of Big Data Technologies Shenzhen Graduate School, Peking University)
Sun, Ziqiang (Communication & Information Security Lab, Institute of Big Data Technologies Shenzhen Graduate School, Peking University)
Liu, Zhen (Communication & Information Security Lab, Institute of Big Data Technologies Shenzhen Graduate School, Peking University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.12, 2015 , pp. 5058-5072 More about this Journal
Abstract
Quaternions have been commonly employed in color image processing, but when the existing pure quaternion representation for color images is used in perceptual hashing, it would degrade the robustness performance since it is sensitive to image manipulations. To improve the robustness in color image perceptual hashing, in this paper a full quaternion representation for color images is proposed by introducing the local image luminance variances. Based on this new representation, a novel Full Quaternion Discrete Cosine Transform (FQDCT)-based hashing is proposed, in which the Quaternion Discrete Cosine Transform (QDCT) is applied to the pseudo-randomly selected regions of the novel full quaternion image to construct two feature matrices. A new hash value in binary is generated from these two matrices. Our experimental results have validated the robustness improvement brought by the proposed full quaternion representation and demonstrated that better performance can be achieved in the proposed FQDCT-based hashing than that in other notable quaternion-based hashing schemes in terms of robustness and discriminability.
Keywords
Perceptual hashing; color images; pure quaternion; full quaternion; Quaternion Discrete Cosine Transform;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Steinebach, F. A. P. Petitcolas, F. Raynal, J. Dittmann, C. Fontaine, S. Seibel, N. Fates, and L. C. Ferri, “StirMark Benchmark: audio watermarking attacks,” in Proc. of IEEE Int. Conf. Information Technology: Coding and Computing, pp. 49-54, 2001. Article (CrossRef Link)
2 T. Fawcett, “An introduction to roc analysis,” Pattern Recognit. Lett., vol. 27, no. 8, pp. 861–874, Jun. 2006. Article (CrossRef Link)   DOI
3 J. Daugman, “The importance of being random: statistical principles of iris recognition,” Pattern Recognition, vol. 36, no. 2, pp. 279–291, 2003. Article (CrossRef Link)   DOI
4 V. Monga and B. L. Evans, “Perceptual image hashing via feature points: Performance evaluation and tradeoffs,” IEEE Trans. Image Processing, vol. 15, no. 11, pp. 3453-3466, Nov. 2006. Article (CrossRef Link)   DOI
5 Z. Li, J. Liu, and J. Tang, “Robust structured subspace learning for data representation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 37, no. 10, pp. 2085-2098, Oct. 2015. Article (CrossRef Link)   DOI
6 W. Feng and B. Hu, "Quaternion discrete cosine transform and its application in color template matching," in Proc. of IEEE Int. Cong. Image and Signal Processing, vol. 2, pp. 252-256, 2008. Article (CrossRef Link)
7 J. Fridrich and M. Goljan, “Robust hash functions for digital watermarking,” in Proc. of IEEE Int. Conf. Information Technology: Coding Computing, pp. 178-183, 2000. Article (CrossRef Link)
8 A. Qamra, Y. Meng and E. Y. Chang, “Enhanced perceptual distance functions and indexing for image replica recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 3, pp. 379-391, Mar. 2005. Article (CrossRef Link)   DOI
9 J. Tang, Z. Li, M. Wang, and R. Zhao, “Neighborhood discriminant hashing for large-scale image retrival,” IEEE Trans. Image Processing, vol. 24, no. 9, pp. 2827-2840, Sep. 2015 Article (CrossRef Link)   DOI
10 A. Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Inf. Forensics and Security, vol. 1, no. 2, pp. 215–230, Jun. 2006. Article (CrossRef Link)   DOI
11 G. Schaefer and M. Stich, "UCID: An uncompressed color image database," in Proc. of SPIE. Storage and Retrieval Methods and Applications for Multimedia, vol. 5307, pp. 472-480, 2004. Article (CrossRef Link)
12 I. H. Laradji, L. Ghouti, and E. H. Khiari, "Perceptual hashing of color images using hypercomplex representations," in Proc. of IEEE Int. Conf. Image Processing, vol. 4, pp. 4402-4406, 2013. Article (CrossRef Link)
13 S. J. Sangwine, “Fourier transforms of colour images using quaternion, or hypercomplex, numbers,” Electron. Lett. vol. 32, no. 21, pp. 979-1980, Oct. 1996. Article (CrossRef Link)   DOI
14 S. C. Pei, J. J. Ding, and J. H. Chang, “Efficient implementation of quaternion Fourier transform, convolution, and correlation by 2-D complex FFT,” IEEE Trans. Signal Processing, vol. 49, no. 11, pp. 2844-2852, Nov. 2001. Article (CrossRef Link)   DOI
15 L. Ghouti, “Robust perceptual color image hashing using quaternion singular value decomposition," in Proc. of IEEE Int. Conf. Acoustics, Speech and Signal Processing, pp. 3794-3798, 2014. Article (CrossRef Link)
16 W. R. Hamilton, Elements of Quaternions, London, U.K: Longmans, Green, 1866.
17 S. C. Pei, J. H. Chang, and J. J. Ding, "Quaternion matrix singular value decomposition and its applications for color image processing," in Proc. of IEEE Int. Conf. Image Processing, vol. 1, pp. 805-808, 2003. Article (CrossRef Linnk)
18 T. A. Ell and S. J. Sangwine, “Hypercomplex Fourier transforms of color images,” IEEE Trans. Image Processing, vol. 16, pp. 22–35, Jan. 2007. Article (CrossRef Link)   DOI
19 Q. Wang and Z. Wang, “Color image registration based on quaternion Fourier transformation,” Optical Engineering, vol. 51, no. 5, pp.1-8, 2012. Article (CrossRef Link)
20 T. K. Tsui, X. P. Zhang, and D. Androutsos, “Color image watermarking using multidimensional Fourier transforms,” IEEE Trans. Inf. Forensics and Security, vol. 3, no. 1, pp. 16–28, Mar. 2008. Article (CrossRef Link)   DOI
21 Y. Zhao, S. Wang, X. Zhang, and H. Yao, “Robust hashing for image authentication using Zernike moments and local features,” IEEE Trans. Inf. Forensics and Security, vol. 8, no. 1, pp. 55–63, Jan. 2013. Article (CrossRef Link)   DOI
22 A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, “Handbook of applied cryptography,” CRC press, 2010.
23 M. Schneider and S.-F. Chang, "A robust content based digital signature for image authentication," in Proc. of IEEE Int. Conf. Image Processing, vol. 3, pp. 227-230, 1996. Article (CrossRef Link)
24 C.-S. Lu, C.-Y. Hsu, S.-W. Sun, and P.-C. Chang, "Robust mesh-based hashing for copy detection and tracing of images," in Proc. of IEEE Int. Conf. Multimedia and Expo, vol. 1, pp. 731-734, 2004. Article (CrossRef Link)
25 Z. Xu, H. Ling, F. Zou, Z. Lu, and P. Li, “Robust image copy detection using multi-resolution histogram,” in Proc. of ACM Int. Conf. Multimedia Information Retrieval, pp. 129–136, 2010. Article (CrossRef Link)
26 Z. Tang, Y. Dai, X. Zhang, and S. Zhang, "Perceptual image hashing with histogram of color vector angles," in Proc. of the 8th Int. Conf. Active Media Technology, Lecture Notes in Computer Science, vol. 7669, pp. 237-246, 2012. Article (CrossRef Link)
27 Z. Tang, Y. Dai, and X. Zhang, “Perceptual hashing for color images using invariant moments,” Appl. Math. Inf. Sci., vol. 6, no. 2S, pp. 643S-650S, 2012.
28 Z. Tang, X. Zhang, X. Dai, J. Yang, and T. Wu, “Robust image hash function using local color features,” Int. J. Electron. and Comm., vol. 67, no. 8, pp.717-722, 2013. Article (CrossRef Link)   DOI