메뉴 건너뛰기




Volumn 26, Issue 3, 2014, Pages 711-724

Robust perceptual image hashing based on ring partition and NMF

Author keywords

Image hashing; Multimedia security; Nonnegative matrix factorization; Ring partition

Indexed keywords


EID: 84894472419     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2013.45     Document Type: Article
Times cited : (192)

References (46)
  • 1
    • 85032771294 scopus 로고    scopus 로고
    • Locality-sensitive hashing for finding nearest neighbors
    • Mar.
    • M. Slaney and M. Casey, "Locality-Sensitive Hashing for Finding Nearest Neighbors," IEEE Signal Processing Magazine, vol. 25, no. 2, pp.128-131, Mar. 2008.
    • (2008) IEEE Signal Processing Magazine , vol.25 , Issue.2 , pp. 128-131
    • Slaney, M.1    Casey, M.2
  • 2
    • 34248561901 scopus 로고    scopus 로고
    • Novel image copy detection with rotating tolerance
    • M.N. Wu, C.C. Lin, and C.C. Chang, "Novel Image Copy Detection with Rotating Tolerance," J. Systems and Software, vol. 80, no. 7, pp. 1057-1069, 2007.
    • (2007) J. Systems and Software , vol.80 , Issue.7 , pp. 1057-1069
    • Wu, M.N.1    Lin, C.C.2    Chang, C.C.3
  • 3
    • 34548069995 scopus 로고    scopus 로고
    • Recent development of perceptual image hashing
    • S. Wang and X. Zhang, "Recent Development of Perceptual Image Hashing," J. Shanghai Univ. (English ed.), vol. 11, no. 4, pp. 323-331, 2007.
    • (2007) J. Shanghai Univ. (English Ed.) , vol.11 , Issue.4 , pp. 323-331
    • Wang, S.1    Zhang, X.2
  • 4
    • 75249099043 scopus 로고    scopus 로고
    • A secure and robust hash-based scheme for image authentication
    • F. Ahmed, M.Y. Siyal, and V.U. Abbas, "A Secure and Robust Hash-Based Scheme for Image Authentication," Signal Processing, vol. 90, no. 5, pp. 1456-1470, 2010.
    • (2010) Signal Processing , vol.90 , Issue.5 , pp. 1456-1470
    • Ahmed, F.1    Siyal, M.Y.2    Abbas, V.U.3
  • 5
    • 83955162216 scopus 로고    scopus 로고
    • Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism
    • C. Qin, C.C. Chang, and P.Y. Chen, "Self-Embedding Fragile Watermarking with Restoration Capability Based on Adaptive Bit Allocation Mechanism," Signal Processing, vol. 92, no. 4, pp. 1137-1150, 2012.
    • (2012) Signal Processing , vol.92 , Issue.4 , pp. 1137-1150
    • Qin, C.1    Chang, C.C.2    Chen, P.Y.3
  • 7
    • 70350221685 scopus 로고    scopus 로고
    • Robust image hashing for tamper detection using non-negative matrix factorization
    • Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su, "Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization," J. Ubiquitous Convergence and Technology, vol. 2, no. 1, pp. 18-26, 2008.
    • (2008) J. Ubiquitous Convergence and Technology , vol.2 , Issue.1 , pp. 18-26
    • Tang, Z.1    Wang, S.2    Zhang, X.3    Wei, W.4    Su, S.5
  • 8
    • 84864130926 scopus 로고    scopus 로고
    • Feature combination in kernel space for distance based image hashing
    • Aug.
    • E. Hassan, S. Chaudhury, and M. Gopal, "Feature Combination in Kernel Space for Distance Based Image Hashing," IEEE Trans. Multimedia, vol. 14, no. 4, pp. 1179-1195, Aug. 2012.
    • (2012) IEEE Trans. Multimedia , vol.14 , Issue.4 , pp. 1179-1195
    • Hassan, E.1    Chaudhury, S.2    Gopal, M.3
  • 9
    • 78651096334 scopus 로고    scopus 로고
    • Multimedia forensic hash based on visual words
    • W. Lu and M. Wu, "Multimedia Forensic Hash Based on Visual Words," Proc. IEEE Int'l Conf. Image Processing, pp. 989-992, 2010.
    • (2010) Proc. IEEE Int'l Conf. Image Processing , pp. 989-992
    • Lu, W.1    Wu, M.2
  • 10
    • 77951971972 scopus 로고    scopus 로고
    • Reduced-reference image quality assessment based on perceptual image hashing
    • X. Lv and Z.J. Wang, "Reduced-Reference Image Quality Assessment Based on Perceptual Image Hashing," Proc. IEEE Int'l Conf. Image Processing, pp. 4361-4364, 2009.
    • (2009) Proc. IEEE Int'l Conf. Image Processing , pp. 4361-4364
    • Lv, X.1    Wang, Z.J.2
  • 13
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication system distinguishing jpeg compression from malicious manipulation
    • Feb.
    • C.Y. Lin and S.F. Chang, "A Robust Image Authentication System Distinguishing JPEG Compression from Malicious Manipulation," IEEE Trans. Circuits System and Video Technology, vol. 11, no. 2, pp. 153-168, Feb. 2001.
    • (2001) IEEE Trans. Circuits System and Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 14
    • 67651097643 scopus 로고    scopus 로고
    • A novel image hash algorithm resistant to print-scan
    • D. Wu, X. Zhou, and X. Niu, "A Novel Image Hash Algorithm Resistant to Print-Scan," Signal Processing, vol. 89, no. 12, pp. 2415-2424, 2009.
    • (2009) Signal Processing , vol.89 , Issue.12 , pp. 2415-2424
    • Wu, D.1    Zhou, X.2    Niu, X.3
  • 15
    • 79953024813 scopus 로고    scopus 로고
    • Lexicographical framework for image hashing with implementation based on dct and nmf
    • Z. Tang, S. Wang, X. Zhang, W. Wei, and Y. Zhao, "Lexicographical Framework for Image Hashing with Implementation Based on DCT and NMF," Multimedia Tools and Applications, vol. 52, no. 2/3, pp. 325-345, 2011.
    • (2011) Multimedia Tools and Applications , vol.52 , Issue.2-3 , pp. 325-345
    • Tang, Z.1    Wang, S.2    Zhang, X.3    Wei, W.4    Zhao, Y.5
  • 18
    • 27844535360 scopus 로고    scopus 로고
    • Robust video hashing based on radial projections of key frames
    • Oct.
    • C.D. Roover, C.D. Vleeschouwer, F. Lefebvre, and B. Macq, "Robust Video Hashing Based on Radial Projections of Key Frames," IEEE Trans. Signal Processing, vol. 53, no. 10, pp. 4020-4036, Oct. 2005.
    • (2005) IEEE Trans. Signal Processing , vol.53 , Issue.10 , pp. 4020-4036
    • Roover, C.D.1    Vleeschouwer, C.D.2    Lefebvre, F.3    Macq, B.4
  • 20
    • 34548085689 scopus 로고    scopus 로고
    • Robust and secure image hashing via non-negative matrix factorizations
    • DOI 10.1109/TIFS.2007.902670
    • V. Monga and M.K. Mihcak, "Robust and Secure Image Hashing via Non-Negative Matrix Factorizations," IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 376-390, Sept. 2007. (Pubitemid 47290573)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 376-390
    • Monga, V.1    Mihcak, M.K.2
  • 21
    • 79957996038 scopus 로고    scopus 로고
    • Robust image hash in radon transform domain for authentication
    • Y. Lei, Y. Wang, and J. Huang, "Robust Image Hash in Radon Transform Domain for Authentication," Signal Processing: Image Comm., vol. 26, no. 6, pp. 280-288, 2011.
    • (2011) Signal Processing: Image Comm. , vol.26 , Issue.6 , pp. 280-288
    • Lei, Y.1    Wang, Y.2    Huang, J.3
  • 22
    • 84894445967 scopus 로고    scopus 로고
    • Feb.
    • USC-SIPI Image Database, http://sipi.usc.edu/database/, Feb. 2007.
    • (2007)
  • 23
    • 84894456881 scopus 로고    scopus 로고
    • Accessed 8 May
    • Ground Truth Database, http://www.cs.washington.edu/research/ imagedatabase/groundtruth/, Accessed 8 May 2008.
    • (2008)
  • 24
    • 0030409375 scopus 로고    scopus 로고
    • A robust content based digital signature for image authentication
    • M. Schneider and S.F. Chang, "A Robust Content Based Digital Signature for Image Authentication," Proc. IEEE Int'l Conf. Image Processing, vol. 3, pp. 227-230, 1996.
    • (1996) Proc. IEEE Int'l Conf. Image Processing , vol.3 , pp. 227-230
    • Schneider, M.1    Chang, S.F.2
  • 25
    • 33750344108 scopus 로고    scopus 로고
    • Perceptual image hashing via feature points: Performance evaluation and tradeoffs
    • DOI 10.1109/TIP.2006.881948
    • V. Monga and B.L. Evans, "Perceptual Image Hashing via Feature Points: Performance Evaluation and Tradeoffs," IEEE Trans. Image Processing, vol. 15, no. 11, pp. 3452-3465, Nov. 2006. (Pubitemid 44615140)
    • (2006) IEEE Transactions on Image Processing , vol.15 , Issue.11 , pp. 3452-3465
    • Monga, V.1    Evans, B.L.2
  • 27
    • 1542529865 scopus 로고    scopus 로고
    • A robust image fingerprinting system using the radon transform
    • J.S. Seo, J. Haitsma, T. Kalker, and C.D. Yoo, "A Robust Image Fingerprinting System Using the Radon Transform," Signal Processing: Image Comm., vol. 19, no. 4, pp. 325-339, 2004.
    • (2004) Signal Processing: Image Comm. , vol.19 , Issue.4 , pp. 325-339
    • Seo, J.S.1    Haitsma, J.2    Kalker, T.3    Yoo, C.D.4
  • 28
    • 34548104101 scopus 로고    scopus 로고
    • Unicity distance of robust image hashing
    • DOI 10.1109/TIFS.2007.902260
    • Y. Mao and M. Wu, "Unicity Distance of Robust Image Hashing," IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 462-467, Sept. 2007. (Pubitemid 47290580)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 462-467
    • Mao, Y.1    Wu, M.2
  • 29
    • 77949696748 scopus 로고    scopus 로고
    • Perceptual image hashing based on virtual watermark detection
    • Apr.
    • F. Khelifi and J. Jiang, "Perceptual Image Hashing Based on Virtual Watermark Detection," IEEE Trans. Image Processing, vol. 19, no. 4, pp. 981-994, Apr. 2010.
    • (2010) IEEE Trans. Image Processing , vol.19 , Issue.4 , pp. 981-994
    • Khelifi, F.1    Jiang, J.2
  • 30
    • 79951589603 scopus 로고    scopus 로고
    • Structural feature-based image hashing and similarity metric for tampering detection
    • Z. Tang, S. Wang, X. Zhang, and W. Wei, "Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection," Fundamenta Informaticae, vol. 106, no. 1, pp. 75-91, 2011.
    • (2011) Fundamenta Informaticae , vol.106 , Issue.1 , pp. 75-91
    • Tang, Z.1    Wang, S.2    Zhang, X.3    Wei, W.4
  • 31
    • 84861117192 scopus 로고    scopus 로고
    • Perceptual image hashing based on shape contexts and local feature points
    • June
    • X. Lv and Z.J. Wang, "Perceptual Image Hashing Based on Shape Contexts and Local Feature Points," IEEE Trans. Information Forensics and Security, vol. 7, no. 3, pp. 1081-1093, June 2012.
    • (2012) IEEE Trans. Information Forensics and Security , vol.7 , Issue.3 , pp. 1081-1093
    • Lv, X.1    Wang, Z.J.2
  • 32
    • 84896693973 scopus 로고    scopus 로고
    • Perceptual hashing for color images using invariant moments
    • Z. Tang, Y. Dai, and X. Zhang, "Perceptual Hashing for Color Images Using Invariant Moments," Applied Math. and Information Sciences, vol. 6, no. 2S, pp. 643-650, 2012.
    • (2012) Applied Math. and Information Sciences , vol.6 , Issue.2 S , pp. 643-650
    • Tang, Z.1    Dai, Y.2    Zhang, X.3
  • 33
    • 84937655864 scopus 로고
    • Visual pattern recognition by moment invariants
    • M.K. Hu, "Visual Pattern Recognition by Moment Invariants," IRE Trans. Information Theory, vol. 8, no. 2, pp. 179-187, 1962.
    • (1962) IRE Trans. Information Theory , vol.8 , Issue.2 , pp. 179-187
    • Hu, M.K.1
  • 34
    • 84859010887 scopus 로고    scopus 로고
    • Robust image hashing based on random gabor filtering and dithered lattice vector quantization
    • Apr.
    • Y. Li, Z. Lu, C. Zhu, and X. Niu, "Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization," IEEE Trans. Image Processing, vol. 21, no. 4, pp. 1963-1980, Apr. 2012.
    • (2012) IEEE Trans. Image Processing , vol.21 , Issue.4 , pp. 1963-1980
    • Li, Y.1    Lu, Z.2    Zhu, C.3    Niu, X.4
  • 36
    • 84872026878 scopus 로고    scopus 로고
    • Robust hashing for image authentication using zernike moments and local features
    • Jan.
    • Y. Zhao, S. Wang, X. Zhang, and H. Yao, "Robust Hashing for Image Authentication Using Zernike Moments and Local Features," IEEE Trans. Information Forensics and Security, vol. 8, no. 1, pp. 55-63, Jan. 2013.
    • (2013) IEEE Trans. Information Forensics and Security , vol.8 , Issue.1 , pp. 55-63
    • Zhao, Y.1    Wang, S.2    Zhang, X.3    Yao, H.4
  • 37
    • 0033592606 scopus 로고    scopus 로고
    • Learning the parts of objects by non-negative matrix factorization
    • D.D. Lee and H.S. Seung, "Learning the Parts of Objects by Non-Negative Matrix Factorization," Nature, vol. 401, pp. 788-791, 1999.
    • (1999) Nature , vol.401 , pp. 788-791
    • Lee, D.D.1    Seung, H.S.2
  • 38
    • 80052600921 scopus 로고    scopus 로고
    • Large margin based nonnegative matrix factorization and partial least squares regression for face recognition
    • J. Pan and J. Zhang, "Large Margin Based Nonnegative Matrix Factorization and Partial Least Squares Regression for Face Recognition," Pattern Recognition Letters, vol. 32, no. 14, pp. 1822-1835, 2011.
    • (2011) Pattern Recognition Letters , vol.32 , Issue.14 , pp. 1822-1835
    • Pan, J.1    Zhang, J.2
  • 39
    • 33748582900 scopus 로고    scopus 로고
    • NMF, LNMF, and DNMF modeling of neural receptive fields involved in human facial expression perception
    • DOI 10.1016/j.jvcir.2006.06.001, PII S104732030600040X
    • I. Buciu and I. Pitas, "NMF, LNMF, and DNMF Modeling of Neural Receptive Fields Involved in Human Facial Expression Perception," J. Visual Comm. and Image Representation, vol. 17, no. 5, pp. 958-969, 2006. (Pubitemid 44380387)
    • (2006) Journal of Visual Communication and Image Representation , vol.17 , Issue.5 , pp. 958-969
    • Buciu, I.1    Pitas, I.2
  • 40
    • 79959533573 scopus 로고    scopus 로고
    • Nonnegative matrix factorization with earth mover's distance metric for image analysis
    • Aug.
    • R. Sandler and M. Lindenbaum, "Nonnegative Matrix Factorization with Earth Mover's Distance Metric for Image Analysis," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 33, no. 8, pp. 1590-1602, Aug. 2011.
    • (2011) IEEE Trans. Pattern Analysis and Machine Intelligence , vol.33 , Issue.8 , pp. 1590-1602
    • Sandler, R.1    Lindenbaum, M.2
  • 41
    • 54749116029 scopus 로고    scopus 로고
    • Nonnegative matrix factorization applied to nonlinear speech and image cryptosystems
    • Sept.
    • S. Xie, Z. Yang, and Y. Fu, "Nonnegative Matrix Factorization Applied to Nonlinear Speech and Image Cryptosystems," IEEE Trans. Circuits and Systems I: Regular Papers, vol. 55, no. 8, pp. 2356-2367, Sept. 2008.
    • (2008) IEEE Trans. Circuits and Systems I: Regular Papers , vol.55 , Issue.8 , pp. 2356-2367
    • Xie, S.1    Yang, Z.2    Fu, Y.3
  • 42
    • 77956014774 scopus 로고    scopus 로고
    • Non-negative matrix factorization for semisupervised heterogeneous data coclustering
    • Oct.
    • Y. Chen, L. Wang, and M. Dong, "Non-Negative Matrix Factorization for Semisupervised Heterogeneous Data Coclustering," IEEE Trans. Knowledge and Data Eng., vol. 22, no. 10, pp. 1459-1474, Oct. 2010.
    • (2010) IEEE Trans. Knowledge and Data Eng. , vol.22 , Issue.10 , pp. 1459-1474
    • Chen, Y.1    Wang, L.2    Dong, M.3
  • 44
    • 34548062342 scopus 로고    scopus 로고
    • Novel discriminant non-negative matrix factorization algorithm with applications to facial image characterization problems
    • DOI 10.1109/TIFS.2007.902017
    • I. Kotsia, S. Zafeiriou, and I. Pitas, "A Novel Discriminant Non-Negative Matrix Factorization Algorithm with Applications to Facial Image Characterization Problems," IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 588-595, Sept. 2007. (Pubitemid 47290591)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 588-595
    • Kotsia, I.1    Zafeiriou, S.2    Pitas, I.3
  • 45
    • 85032751954 scopus 로고    scopus 로고
    • Watermarking schemes evaluation
    • Sept.
    • F.A.P. Petitcolas, "Watermarking Schemes Evaluation," IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 58-64, Sept. 2000.
    • (2000) IEEE Signal Processing Magazine , vol.17 , Issue.5 , pp. 58-64
    • Petitcolas, F.A.P.1
  • 46
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to roc analysis
    • T. Fawcett, "An Introduction to ROC Analysis," Pattern Recognition Letters, vol. 27, no. 8, pp. 861-874, 2006.
    • (2006) Pattern Recognition Letters , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.