Title: Geometric DistortionResilient Image Hashing Scheme and Its Applications on Copy Detection and Authen
1Geometric Distortion-Resilient Image Hashing
Scheme and Its Applications on Copy Detection and
Authentication
- Source Multimedia Systems, Vol.11, No.2,
December 2005, pp.159 -173 - SCI 69(54/78, Impact factor 0.528)
- Authors Chun-Shien Lu and Chao-Yong Hsu
- Speaker Shu-Wei Guo(???)
- Date 2006/02/17
2Outline
- Introduction
- Problem Statement
- Proposed Method
- Analysis
- Experiments
- Conclusions
3Introduction
- Image hashing (vs. traditional watermarking)
Image Hashing
0110010001
4Introduction
- Image hashing (vs. traditional watermarking)
- Non-invasive embedding
- Condensed representation
- Work together with a feature database
- Resist either malicious or incidental attacks
5Problem Statement
I original image X the set of images modified
from I and perceptually similar to I Y the set
of image modified from I but dissimilar to I Z
the set of images that are irrelevant to I
6Problem Statement
Traditional cryptographic hashing
although x may be very similar to I
Image hashing function
, where d(.) is Hamming distance
Two conditions must be satisfied
1. If two images are similar, their corresponding
hashes much be highly correlated 2.
Collision-free
7Proposed Method
8Proposed Method (cont.)
Step 1 Triangulation
Harris Delaunay Algorithms
9Proposed Method (cont.)
Step 2 Normalization
10Proposed Method (cont.)
Step 3 Hash code generation
11Proposed Method (cont.)
Step 3 Hash code generation
AC0(1), AC1(1), AC2(1), AC3(1), AC4(1), AC5(1)
12 32 4 51 22
9
X
X
X
51, 32, 22
Hash code
0 1 0 1 1
0
Collision free
12Analysis
Samples 20,000
Robustness and Discrimination
13Similarity Measurement
Im and In are considered to be similar if at
least N mesh-pairs are matched
N3 in this paper
M1 hash code 00100101
M2 hash code 11000001
T0.25
unmatched
BER(M1, M2)4/8 gt T
(Bit Error Rate)
14Experiments - Copy Detection
Baboon
SPA(Signal processing attack), GLGT(general
linear geometric transform), CAR(change of the
aspect ratio), LR(line removal),
RC(rotationcropping), RRS(rotationre-scaling),
RB(random bending)
15Copy Detection
16Failure Image Query
Rotatedcropped
noisy
cropped
Convolution filtered
17Content Authentication
Tampering
18Content Authentication
TamperingRotation
19Content Authentication
Tampering
20Content Authentication
TamperingJPEG Compression(QF 30)
21Conclusions
- Mesh-based robust hash generation
- Hash database construction for error resilient
and fast searching
22Harris Detector Mathematics
Harris Method
23Harris Detector Mathematics
flat regionno change in all directions
edgeno change along the edge direction
cornersignificant change in all directions
24Harris Detector Mathematics
Change of intensity for the shift u,v
25Harris Detector Mathematics
For small shifts u,v we have a bilinear
approximation
where M is a 2?2 matrix computed from image
derivatives
26Harris Detector Mathematics
Intensity change in shifting window eigenvalue
analysis
?1, ?2 eigenvalues of M
direction of the fastest change
Ellipse E(u,v) const
direction of the slowest change
(?max)-1/2
(?min)-1/2
27Harris Detector Mathematics
?2
Edge ?2 gtgt ?1
Classification of image points using eigenvalues
of M
Corner?1 and ?2 are large, ?1 ?2E
increases in all directions
?1 and ?2 are smallE is almost constant in all
directions
Edge ?1 gtgt ?2
Flat region
?1
28Delaunay method
Delaunay Method
29Delaunay method
Delaunay Method
X
30Appendix