703 research outputs found

    A Robust Image Hashing Algorithm Resistant Against Geometrical Attacks

    Get PDF
    This paper proposes a robust image hashing method which is robust against common image processing attacks and geometric distortion attacks. In order to resist against geometric attacks, the log-polar mapping (LPM) and contourlet transform are employed to obtain the low frequency sub-band image. Then the sub-band image is divided into some non-overlapping blocks, and low and middle frequency coefficients are selected from each block after discrete cosine transform. The singular value decomposition (SVD) is applied in each block to obtain the first digit of the maximum singular value. Finally, the features are scrambled and quantized as the safe hash bits. Experimental results show that the algorithm is not only resistant against common image processing attacks and geometric distortion attacks, but also discriminative to content changes

    A Short Survey on Perceptual Hash Function

    Get PDF
    The authentication of digital image has become more important as these images can be easily manipulated by using image processing tools leading to various problems such as copyright infringement and hostile tampering to the image contents. It is almost impossible to distinguish subjectively which images are original and which have been manipulated. There are several cryptographic hash functions that map the input data to short binary strings but these traditional cryptographic hash functions is not suitable for image authentication as they are very sensitive to every single bit of input data. When using a cryptographic hash function, the change of even one bit of the original data results in a radically different value. A modified image should be detected as authentic by the hash function and at the same time must be robust against incidental and legitimate modifications on multimedia data. The main aim of this paper is to present a survey of perceptual hash functions for image authentication.Keywords: Hash function, image authentication*Cite as: Arambam Neelima, Kh. Manglem Singh, “A Short Survey on Perceptual Hash Function†ADBU-J.Engg Tech, 1(2014) 0011405(8pp

    Cumulative object categorization in clutter

    Get PDF
    In this paper we present an approach based on scene- or part-graphs for geometrically categorizing touching and occluded objects. We use additive RGBD feature descriptors and hashing of graph configuration parameters for describing the spatial arrangement of constituent parts. The presented experiments quantify that this method outperforms our earlier part-voting and sliding window classification. We evaluated our approach on cluttered scenes, and by using a 3D dataset containing over 15000 Kinect scans of over 100 objects which were grouped into general geometric categories. Additionally, color, geometric, and combined features were compared for categorization tasks

    Invariant Spectral Hashing of Image Saliency Graph

    Get PDF
    Image hashing is the process of associating a short vector of bits to an image. The resulting summaries are useful in many applications including image indexing, image authentication and pattern recognition. These hashes need to be invariant under transformations of the image that result in similar visual content, but should drastically differ for conceptually distinct contents. This paper proposes an image hashing method that is invariant under rotation, scaling and translation of the image. The gist of our approach relies on the geometric characterization of salient point distribution in the image. This is achieved by the definition of a saliency graph connecting these points jointly with an image intensity function on the graph nodes. An invariant hash is then obtained by considering the spectrum of this function in the eigenvector basis of the graph Laplacian, that is, its graph Fourier transform. Interestingly, this spectrum is invariant under any relabeling of the graph nodes. The graph reveals geometric information of the image, making the hash robust to image transformation, yet distinct for different visual content. The efficiency of the proposed method is assessed on a set of MRI 2-D slices and on a database of faces

    Average Hashing for Perceptual Image Similarity in Mobile Phone Application

    Full text link
    Common problem occurs in almost all mobile devices was duplicated data or files. Such as duplicated images that often happen by event like capturing perceptually similar photos by the user, or images that shared several times in messaging applications chat groups. This common problem can be solved by manually search and remove the duplicated images one by one by the users, but better solutions is by building automated application that search perceptually similar images then provide the result to the users. We study and implementing Average Hashing and Hamming distance for perceptual image similarity into application under mobile phone platform to realize the solution for the problem. The result was very promising in speed and accuracy for finding perceptually similar images under limited resources device like mobile phone

    Perceptual Image Hashing

    Get PDF
    corecore