TY - JOUR
T1 - Perceptual image hashing via feature points
T2 - Performance evaluation and tradeoffs
AU - Monga, Vishal
AU - Evans, Brian L.
N1 - Funding Information:
Manuscript received May 12, 2005; revised April 13, 3006. This work was supported by a gift from the Xerox Foundation and an equipment donation from Intel. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Ron Kimmel.
PY - 2006/11
Y1 - 2006/11
N2 - We propose an image hashing paradigm using visually significant feature points. The feature points should be largely invariant under perceptually insignificant distortions. To satisfy this, we propose an iterative feature detector to extract significant geometry preserving feature points. We apply probabilistic quantization on the derived features to introduce randomness, which, in turn, reduces vulnerability to adversarial attacks. The proposed hash algorithm withstands standard benchmark (e.g., Stirmark) attacks, including compression, geometric distortions of scaling and small-angle rotation, and common signal-processing operations. Content changing (malicious) manipulations of image data are also accurately detected. Detailed statistical analysis in the form of receiver operating characteristic (ROC) curves is presented and reveals the success of the proposed scheme in achieving perceptual robustness while avoiding misclassification.
AB - We propose an image hashing paradigm using visually significant feature points. The feature points should be largely invariant under perceptually insignificant distortions. To satisfy this, we propose an iterative feature detector to extract significant geometry preserving feature points. We apply probabilistic quantization on the derived features to introduce randomness, which, in turn, reduces vulnerability to adversarial attacks. The proposed hash algorithm withstands standard benchmark (e.g., Stirmark) attacks, including compression, geometric distortions of scaling and small-angle rotation, and common signal-processing operations. Content changing (malicious) manipulations of image data are also accurately detected. Detailed statistical analysis in the form of receiver operating characteristic (ROC) curves is presented and reveals the success of the proposed scheme in achieving perceptual robustness while avoiding misclassification.
UR - http://www.scopus.com/inward/record.url?scp=33750344108&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33750344108&partnerID=8YFLogxK
U2 - 10.1109/TIP.2006.881948
DO - 10.1109/TIP.2006.881948
M3 - Article
C2 - 17076404
AN - SCOPUS:33750344108
SN - 1057-7149
VL - 15
SP - 3452
EP - 3465
JO - IEEE Transactions on Image Processing
JF - IEEE Transactions on Image Processing
IS - 11
ER -