TY - CHAP
T1 - Histogram-based image hashing for searching content-preserving copies
AU - Xiang, Shijun
AU - Kim, Hyoung Joong
PY - 2011
Y1 - 2011
N2 - Image hashing as a compact abstract can be used for content search. Towards this end, a desired image hashing function should be resistant to those content-preserving manipulations (including additive-noise like processing and geometric deformation operations). Most countermeasures proposed in the literature usually focus on the problem of additive noises and global affine transform operations, but few are resistant to recently reported random bending attacks (RBAs). In this paper, we address an efficient and effective image hashing algorithm by using the resistance of two statistical features (image histogram in shape and mean value) for those challenging geometric deformations. Since the features are extracted from Gaussian-filtered images, the hash is also robust to common additive noise-like operations (e.g., lossy compression, low-pass filtering). The hash uniqueness is satisfactory for different sources of images. With a large number of real-world images, we construct a hash-based image search system to show that the hash function can be used for searching content-preserving copies from the same source.
AB - Image hashing as a compact abstract can be used for content search. Towards this end, a desired image hashing function should be resistant to those content-preserving manipulations (including additive-noise like processing and geometric deformation operations). Most countermeasures proposed in the literature usually focus on the problem of additive noises and global affine transform operations, but few are resistant to recently reported random bending attacks (RBAs). In this paper, we address an efficient and effective image hashing algorithm by using the resistance of two statistical features (image histogram in shape and mean value) for those challenging geometric deformations. Since the features are extracted from Gaussian-filtered images, the hash is also robust to common additive noise-like operations (e.g., lossy compression, low-pass filtering). The hash uniqueness is satisfactory for different sources of images. With a large number of real-world images, we construct a hash-based image search system to show that the hash function can be used for searching content-preserving copies from the same source.
UR - http://www.scopus.com/inward/record.url?scp=84863052487&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84863052487&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-24556-5_5
DO - 10.1007/978-3-642-24556-5_5
M3 - Chapter
AN - SCOPUS:84863052487
SN - 9783642245558
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 83
EP - 108
BT - Transactions on Data Hiding and Multimedia Security VI
A2 - Shi, Yin
A2 - Emmanuel, Sabu
A2 - Kankanhalli, Mohan
A2 - Chang, Shih-Fu
A2 - Radhakrishnan, Regunathan
A2 - Ma, Fulong
A2 - Zhao, Li
ER -