메뉴 건너뛰기




Volumn 21, Issue 4, 2012, Pages 1963-1980

Robust image hashing based on random gabor filtering and dithered lattice vector quantization

Author keywords

Dithered lattice vector quantization (LVQ); feature extraction; image authentication; robust hashing

Indexed keywords

GABOR FILTERING; HASHING ALGORITHMS; IMAGE AUTHENTICATION; IMAGE HASHING; LATTICE VECTOR QUANTIZATION; QUANTIZATION SCHEMES; ROBUST HASHING; ROTATION INVARIANT; STATE-OF-THE-ART ALGORITHMS; TEST IMAGES;

EID: 84859010887     PISSN: 10577149     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIP.2011.2171698     Document Type: Article
Times cited : (88)

References (42)
  • 3
    • 0141627166 scopus 로고    scopus 로고
    • A highly robust audio fingerprinting system
    • Oct.
    • J. Haitsma and T. Kalker, "A highly robust audio fingerprinting system," in Proc. Conf. Music Inf. Retrieval, Oct. 2002, vol. 32, pp. 107-115.
    • (2002) Proc. Conf. Music Inf. Retrieval , vol.32 , pp. 107-115
    • Haitsma, J.1    Kalker, T.2
  • 4
    • 33845669994 scopus 로고    scopus 로고
    • Spatio-temporal transform based video hashing
    • DOI 10.1109/TMM.2006.884614
    • B. Coskun, B. Sankur, and N. Memon, "Spatio-temporal transform based video hashing," IEEE Trans. Multimedia, vol. 8, no. 6, pp. 1190-1208, Dec. 2006. (Pubitemid 44955684)
    • (2006) IEEE Transactions on Multimedia , vol.8 , Issue.6 , pp. 1190-1208
    • Coskun, B.1    Sankur, B.2    Memon, N.3
  • 5
    • 64849093052 scopus 로고    scopus 로고
    • Distortion estimation in compressed music using only audio fingerprints
    • Feb.
    • P. J. O. Doets and R. L. Lagendijk, "Distortion estimation in compressed music using only audio fingerprints," IEEE Trans. Speech Audio Lang. Process., vol. 16, no. 2, pp. 302-317, Feb. 2008.
    • (2008) IEEE Trans. Speech Audio Lang. Process. , vol.16 , Issue.2 , pp. 302-317
    • Doets, P.J.O.1    Lagendijk, R.L.2
  • 6
    • 33750344108 scopus 로고    scopus 로고
    • Perceptual image hashing via feature points: Performance evaluation and tradeoffs
    • DOI 10.1109/TIP.2006.881948
    • V. Monga and B. L. Evans, "Perceptual image hashing via feature points: Performance evaluation and tradeoffs," IEEE Trans. Image Process., vol. 15, no. 11, pp. 3452-3465, Nov. 2006. (Pubitemid 44615140)
    • (2006) IEEE Transactions on Image Processing , vol.15 , Issue.11 , pp. 3452-3465
    • Monga, V.1    Evans, B.L.2
  • 11
    • 0141850639 scopus 로고    scopus 로고
    • New iterative geometric methods for robust perceptual image hashing
    • Philadephia, PA Nov.
    • M. K. Mihcak and R. Venkatesan, "New iterative geometric methods for robust perceptual image hashing," in Proc. ACMWorkshop Security Privacy Digit. Rights Manage., Philadephia, PA, Nov. 2001, vol. 2320, pp. 13-21.
    • (2001) Proc. ACMWorkshop Security Privacy Digit. Rights Manage. , vol.2320 , pp. 13-21
    • Mihcak, M.K.1    Venkatesan, R.2
  • 12
    • 85007375266 scopus 로고    scopus 로고
    • Towards robust, content based techniques for image authentication
    • Dec.
    • M. P. Queluz, "Towards robust, content based techniques for image authentication," in Proc. IEEE Workshop Multimedia Signal Process., Dec. 1998, pp. 297-302.
    • (1998) Proc. IEEE Workshop Multimedia Signal Process. , pp. 297-302
    • Queluz, M.P.1
  • 14
    • 34548085689 scopus 로고    scopus 로고
    • Robust and secure image hashing via non-negative matrix factorizations
    • DOI 10.1109/TIFS.2007.902670
    • V. Monga and M. K. Mihcak, "Robust and secure image hashing via non-negative matrix factorizations," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 376-390, Sep. 2007. (Pubitemid 47290573)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 376-390
    • Monga, V.1    Mihcak, M.K.2
  • 15
    • 69949143849 scopus 로고    scopus 로고
    • A DCT-VQ based multipurpose image hashing scheme for copyright protection and content authentication
    • Sep.
    • F. X. Yu and Z. M. Lu, "A DCT-VQ based multipurpose image hashing scheme for copyright protection and content authentication," Int. J. Innov. Comput. Inf. Control, vol. 5, no. 9, pp. 2703-2710, Sep. 2009.
    • (2009) Int. J. Innov. Comput. Inf. Control , vol.5 , Issue.9 , pp. 2703-2710
    • Yu, F.X.1    Lu, Z.M.2
  • 16
    • 48149093483 scopus 로고    scopus 로고
    • Robust hash for detecting and localizing image tampering
    • S. Roy and Q. Sun, "Robust hash for detecting and localizing image tampering," in Proc. IEEE Conf. Image Process., Sep. 2007, vol. 6, pp. 117-120.
    • (2007) Proc. IEEE Conf. Image Process., Sep. , vol.6 , pp. 117-120
    • Roy, S.1    Sun, Q.2
  • 17
    • 1542529865 scopus 로고    scopus 로고
    • A robust image fingerprinting system using the Radon transform
    • Apr.
    • S. S. Jin, J. Haitsma, T. Kalker, and C. D. Yoo, "A robust image fingerprinting system using the Radon transform," Signal Process. Image Commun., vol. 19, no. 4, pp. 325-339, Apr. 2004.
    • (2004) Signal Process. Image Commun. , vol.19 , Issue.4 , pp. 325-339
    • Jin, S.S.1    Haitsma, J.2    Kalker, T.3    Yoo, C.D.4
  • 19
    • 27844535360 scopus 로고    scopus 로고
    • Robust video hashing based on radial projections of key frames
    • DOI 10.1109/TSP.2005.855414
    • C. D. Roover, C. D. Vleeschouwer, F. Lefèbvre, and B. Macq, "Robust video hashing based on radial projections of key frames," IEEE Trans. Signal Process., vol. 53, no. 10, pp. 4020-4037, Oct. 2005. (Pubitemid 41638251)
    • (2005) IEEE Transactions on Signal Processing , vol.53 , Issue.10 , pp. 4020-4037
    • De Roover, C.1    De Vleeschouwer, C.2    Lefebvre, F.3    MacQ, B.4
  • 20
    • 84947226140 scopus 로고    scopus 로고
    • A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding
    • Information Hiding
    • M. K. Mihcak and R. Venkatesan, "A perceptual audio hashing algorithm: A tool for robust audio identification and information hiding," in Proc. Workshop Inf. Hiding, Pittsburgh, PA, Apr. 2001, vol. 2137, pp. 51-65. (Pubitemid 33367658)
    • (2001) LECTURE NOTES in COMPUTER SCIENCE , Issue.2137 , pp. 51-65
    • Mihcak, M.K.1    Venkatesan, R.2
  • 21
    • 33645004781 scopus 로고    scopus 로고
    • A clustering based approach to perceptual image hashing
    • Mar.
    • V. Monga, A. Banerjee, and B. L. Evans, "A clustering based approach to perceptual image hashing," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 68-79, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 68-79
    • Monga, V.1    Banerjee, A.2    Evans, B.L.3
  • 22
    • 21844448383 scopus 로고    scopus 로고
    • A model for improving the performance of feature extraction based robust hashing
    • DOI 10.1117/12.587592, 06, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
    • E. P. McCarthy, F. Balado, G. C. M. Silvestre, and N. J. Hurley, "A model for improving the performance of feature extraction based robust hashing," in Proc. SPIE-Security, Steganography, and Watermarking of Multimedia Contents VII, Jan. 2005, vol. 5681, pp. 59-67. (Pubitemid 40952968)
    • (2005) Proceedings of SPIE - The International Society for Optical Engineering , vol.5681 , pp. 59-67
    • McCarthy, E.P.1    Balado, F.2    Silvestre, G.C.M.3    Hurley, N.J.4
  • 23
    • 34548104101 scopus 로고    scopus 로고
    • Unicity distance of robust image hashing
    • DOI 10.1109/TIFS.2007.902260
    • Y. Mao and M. Wu, "Unicity distance of robust image hashing," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 462-467, Sep. 2007. (Pubitemid 47290580)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 462-467
    • Mao, Y.1    Wu, M.2
  • 24
    • 69949141557 scopus 로고    scopus 로고
    • On the security of non-forgeable robust hash functions
    • Oct.
    • Q. Li and S. Roy, "On the security of non-forgeable robust hash functions," in Proc. IEEE Conf. Image Process., Oct. 2008, pp. 3124-3127.
    • (2008) Proc. IEEE Conf. Image Process. , pp. 3124-3127
    • Li, Q.1    Roy, S.2
  • 25
    • 46449112798 scopus 로고    scopus 로고
    • Attacking some perceptual image hash algorithms
    • Jul.
    • W. Li and B. Preneel, "Attacking some perceptual image hash algorithms," in Proc. IEEE Conf. Multimedia Expo, Jul. 2007, pp. 879-882.
    • (2007) Proc. IEEE Conf. Multimedia Expo , pp. 879-882
    • Li, W.1    Preneel, B.2
  • 26
    • 70450227748 scopus 로고    scopus 로고
    • Quantum hashing for multimedia
    • Dec.
    • M. Jin and C. D. Yoo, "Quantum hashing for multimedia," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 982-994, Dec. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.4 , pp. 982-994
    • Jin, M.1    Yoo, C.D.2
  • 27
    • 77949696748 scopus 로고    scopus 로고
    • Perceptual image hashing based on virtual watermark detection
    • Apr.
    • F. Khelifi and J. M. Jiang, "Perceptual image hashing based on virtual watermark detection," IEEE Trans. Image Process., vol. 19, no. 4, pp. 981-994, Apr. 2010.
    • (2010) IEEE Trans. Image Process. , vol.19 , Issue.4 , pp. 981-994
    • Khelifi, F.1    Jiang, J.M.2
  • 28
    • 70350582578 scopus 로고    scopus 로고
    • Hash-based identification of sparse image tampering
    • Nov.
    • M. Tagliasacchi, G. Valenzise, and S. Tubaro, "Hash-based identification of sparse image tampering," IEEE Trans. Image Process., vol. 18, no. 11, pp. 2491-2504, Nov. 2009.
    • (2009) IEEE Trans. Image Process. , vol.18 , Issue.11 , pp. 2491-2504
    • Tagliasacchi, M.1    Valenzise, G.2    Tubaro, S.3
  • 30
    • 0022098435 scopus 로고
    • Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters
    • Jul.
    • J. G. Daugman, "Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters," J. Opt. Soc. Amer. A, vol. 2, no. 7, pp. 1160-1169, Jul. 1985.
    • (1985) J. Opt. Soc. Amer. A , vol.2 , Issue.7 , pp. 1160-1169
    • Daugman, J.G.1
  • 31
    • 0031152925 scopus 로고    scopus 로고
    • Robust rotation-invariant texture classification: Wavelet, Gabor filter and GMRF based schemes
    • R. Porter and N. Canagarajah, "Robust rotation-invariant texture classification: wavelet, Gabor filter and GMRF based schemes," Proc. Inst. Elect. Eng.-Vis. Image Signal Process., vol. 144, no. 3, pp. 180-188, Jun. 1997. (Pubitemid 127754936)
    • (1997) IEE Proceedings: Vision, Image and Signal Processing , vol.144 , Issue.3 , pp. 180-188
    • Porter, R.1    Canagarajah, N.2
  • 33
    • 0020098639 scopus 로고
    • On the structure of vector quantizers
    • Mar.
    • A. Gersho, "On the structure of vector quantizers," IEEE Trans. Inf. Theory, vol. IT-28, no. 2, pp. 157-166, Mar. 1982.
    • (1982) IEEE Trans. Inf. Theory , Issue.2 IT28 , pp. 157-166
    • Gersho, A.1
  • 35
    • 0020102220 scopus 로고
    • Fast quantizing and decoding algorithms for lattice quantizers and codes
    • J. H. Conway and N. J. A. Sloane, "Fast quantizing and decoding algorithms for lattice quantizers and codes," IEEE Trans. Inf. Theory, vol. IT-28, no. 2, pp. 227-232, Mar. 1982. (Pubitemid 12499773)
    • (1982) IEEE Transactions on Information Theory , vol.IT-28 , Issue.2 , pp. 227-232
    • Conway, J.H.1    Sloane, N.J.A.2
  • 36
    • 24344459752 scopus 로고    scopus 로고
    • Online]. Available:
    • J. Li, "Photography Image Database." [Online]. Available: http://www.stat.psu.edu/jiali/index.download.html
    • Photography Image Database
    • Li, J.1
  • 40
    • 67651097643 scopus 로고    scopus 로고
    • A novel image hash algorithm resistant to print-scan
    • Dec.
    • D. Wu, X. B. Zhou, and X. M. Niu, "A novel image hash algorithm resistant to print-scan," Signal Process., vol. 89, no. 12, pp. 2415-2424, Dec. 2009.
    • (2009) Signal Process. , vol.89 , Issue.12 , pp. 2415-2424
    • Wu, D.1    Zhou, X.B.2    Niu, X.M.3
  • 41
    • 44049106873 scopus 로고    scopus 로고
    • Confusion/diffusion capabilities of some robust hash functions
    • Mar.
    • B. Coskun and N. Memon, "Confusion/diffusion capabilities of some robust hash functions," in Proc. Conf. Inf. Sci. Syst., Mar. 2006, pp. 1188-1193.
    • (2006) Proc. Conf. Inf. Sci. Syst. , pp. 1188-1193
    • Coskun, B.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.