TY - JOUR
T1 - A clustering based approach to perceptual image hashing
AU - Monga, Vishal
AU - Banerjee, A.
AU - Evans, B. L.
N1 - Funding Information:
Manuscript received June 6, 2004; revised July 22, 2005. This work was supported by a grant from the Xerox Foundation. This work was performed while V. Monga and A. Banerjee were with the Department of Electrical and Computer Engineering, The University of Texas, Austin. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Ton Kalker.
PY - 2006/3
Y1 - 2006/3
N2 - A perceptual image hash function maps an image to a short binary string based on an image's appearance to the human eye. Perceptual image hashing is useful in image databases, watermarking, and authentication. In this paper, we decouple image hashing into feature extraction (intermediate hash) followed by data clustering (final hash). For any perceptually significant feature extractor, we propose a polynomial-time heuristic clustering algorithm that automatically determines the final hash length needed to satisfy a specified distortion. We prove that the decision version of our clustering problem is NP complete. Based on the proposed algorithm, we develop two variations to facilitate perceptual robustness versus fragility tradeoffs. We validate the perceptual significance of our hash by testing under Stirmark attacks. Finally, we develop randomized clustering algorithms for the purposes of secure image hashing.
AB - A perceptual image hash function maps an image to a short binary string based on an image's appearance to the human eye. Perceptual image hashing is useful in image databases, watermarking, and authentication. In this paper, we decouple image hashing into feature extraction (intermediate hash) followed by data clustering (final hash). For any perceptually significant feature extractor, we propose a polynomial-time heuristic clustering algorithm that automatically determines the final hash length needed to satisfy a specified distortion. We prove that the decision version of our clustering problem is NP complete. Based on the proposed algorithm, we develop two variations to facilitate perceptual robustness versus fragility tradeoffs. We validate the perceptual significance of our hash by testing under Stirmark attacks. Finally, we develop randomized clustering algorithms for the purposes of secure image hashing.
UR - http://www.scopus.com/inward/record.url?scp=33645004781&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33645004781&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2005.863502
DO - 10.1109/TIFS.2005.863502
M3 - Article
AN - SCOPUS:33645004781
SN - 1556-6013
VL - 1
SP - 68
EP - 79
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 1
ER -