CN102129549B - Image Hash method based on thumbnail and singular value decomposition - Google Patents

Image Hash method based on thumbnail and singular value decomposition Download PDF

Info

Publication number
CN102129549B
CN102129549B CN201110033139A CN201110033139A CN102129549B CN 102129549 B CN102129549 B CN 102129549B CN 201110033139 A CN201110033139 A CN 201110033139A CN 201110033139 A CN201110033139 A CN 201110033139A CN 102129549 B CN102129549 B CN 102129549B
Authority
CN
China
Prior art keywords
image
thumbnail
singular value
hash
characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110033139A
Other languages
Chinese (zh)
Other versions
CN102129549A (en
Inventor
唐振军
张显全
孙容海
秦芳远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangxi Normal University
Original Assignee
Guangxi Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangxi Normal University filed Critical Guangxi Normal University
Priority to CN201110033139A priority Critical patent/CN102129549B/en
Publication of CN102129549A publication Critical patent/CN102129549A/en
Application granted granted Critical
Publication of CN102129549B publication Critical patent/CN102129549B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to an image Hash method based on thumbnail and singular value decomposition. The method comprises the following steps of: pre-processing an image and blocking; applying the singular value decomposition to an image block and extracting a first singular value and a second singular value as characteristics; generating the thumbnail of the original image by a bilinear interpolation method and performing the singular value decomposition, and taking the first singular value and the second singular value as the characteristics; normalizing the characteristics of the image block and the thumbnail, and rearranging the positions of the characteristic sequence of the image block; based on the first singular value and the second singular value of the thumbnail, calculating an Euclidean distance between each pair of singular values and the thumbnail, and connecting all the distance values in series, namely during similarity judgment of the image Hash, calculating an L1 norm of two image Hashes; if the L1 norm is smaller than a set threshold value, determining that the corresponding images are similar; and if the L1 norm is greater than or equal to the set threshold value, determining that the corresponding images are different. The method has robustness to common number processing such as joint photographic experts group (JPEG) compression, proper noise interference, brightness regulation, contrast enhancement and the like; and the method has high uniqueness.

Description

Image Hash method based on thumbnail and svd
Technical field
The present invention relates to signal Processing field and field of computer technology, particularly a kind of image Hash method based on thumbnail and svd.
Background technology
Along with popularizing of image acquisition equipments such as digital camera, digital picture increases by geometric progression, and how effectively the management and retrieval digital picture becomes the problem that people face.Meanwhile, the characteristics that digital picture is easy to duplicate and revise make picture material infringement, distort, problem such as forgery is serious day by day, how to protect problems such as image copyright to become more and more important better.Image Hash (Hash) is a kind of emerging technology of multi-media information security.It identifies this image with the short sequence of extracting in the image, can be widely used in fields such as image authentication, copy detection, digital watermarking, image retrieval.
Because cryptography Hash function such as SHA-1 and MD5 are very responsive to the variation of input data, the change of any 1 bit all can change the hash value of output fully, therefore is not suitable for image.Often will carry out normal digital processing like enhancing, JPEG compression etc. to image in the practical application, material alterations does not take place in its content, hopes that image Hash remains unchanged.Usually, image Hash should satisfy two conditions: 1) perception robustness, and two promptly similar width of cloth images to perception, no matter whether interior data is consistent, their Hash is identical or very approaching with very big probability; 2) uniqueness, promptly different images has pictures different Hash.
Different according to constructing technology, conventional images Hash method roughly is divided into following five types: (1) is based on the method for image statistics; (2) based on the method for invariant relation; (3) based on the method for image rough representation; (4) utilize image low layer semantic feature; (5) utilization matrix decomposition technology.Specifically consult following document:
1.R.Venkatesan,S.-M.Koon,M.H.Jakubowski,et?al.,Robust?image?hashing[C],in?Proc.ofthe?IEEE?International?Conference?on?Image?Processing,2000,3:664-666,Vancouver,BC,Canada,September?10-13,2000.
2.C.Y.Lin?and?S.F.Chang,A?robust?image?authentication?system?distinguishing?JPEGcompression?from?malicious?manipulation[J].IEEE?Transactions?on?Circuits?and?Systems?forVideo?Technology,2001,11(2):153-168.
3.A.Swaminathan,Y.Mao?and?M.Wu,Robust?and?secure?image?hashing[J].IEEETransactions?on?Information?Forensics?and?Security,2006,1(2):215-230.
4.V.Monga?and?B.L.Evans,Perceptual?image?hashing?via?feature?points:performanceevaluation?and?trade-offs[J].IEEE?Transactions?on?Image?Processing,2006,15(11):3453-3466.
5.V.Monga?and?M.K.Mihcak,Robust?and?secure?image?hashing?via?non-negative?matrixfactorizations[J].IEEE?Transactions?on?Information?Forensics?and?Security,2007,2(3):376-390.
Above-mentioned prior art has robustness to some digital processing mostly, like JPEG compression, digital filtering, geometric transformation, but the relatively poor deficiency of ubiquity uniqueness.
Summary of the invention
The object of the present invention is to provide a kind of image Hash method based on thumbnail and svd, this method can extract sane Hash from digital picture, sane to common Flame Image Process, and has good uniqueness.
A kind of image Hash method based on thumbnail and svd earlier to the input picture pre-service, is carried out non-overlapped piecemeal again; Then svd is applied to each image block, gets the 1st and the 2nd singular value, convert to input picture with image block image of the same size and get luminance component and represent with bilinear interpolation as block feature; Generate the thumbnail of original image, simultaneously svd is applied to thumbnail, get the 1st and the 2nd singular value as characteristic; With the characteristic value normalization of image block and thumbnail, and the characteristic sequence of image block being carried out position rearrangement reaction, is benchmark with the 1st, 2 singular value of thumbnail; Calculate all the other every pair singular value and its Euclidean distance, all distance values of contacting are image Hash, when judging two image Hash similaritys; Calculate their L1 norm; If less than setting threshold, think that its corresponding image is identical, otherwise think different images.
The concrete steps of this method are following:
(1) image pre-service: input picture I is carried out pre-service, comprise picture size normalization and color space conversion.Use earlier bilinear interpolation, picture specification is changed into M * M size,, then it is transformed into the YCbCr space, get Y component representative image if be input as coloured image.Remember that pretreated image is J;
(2) image block: J is divided into size is the non overlapping blocks of t * t, a total N=M 2/ t 2Individual image block (image is returned when formatting, and gets the integral multiple that M is t) is numbered by from left to right inferior ordered pair piecemeal from top to bottom, remembers that i image block is B i(1≤i≤N);
(3) computed image block feature: establish B iSvd be designated as [U iS iV i]=SVD (B i), U wherein iAnd V iBe unitary matrix, S iBe diagonal matrix, S iElement on the diagonal line is B iSingular value, get B iThe the 1st, 2 singular value as the image block characteristic, be designated as p respectively iAnd q i, i.e. p i=S i(1,1) and q i=S i(2,2).Contact respectively the 1st, 2 characteristic of image block can obtain describing the proper vector p=[p of entire image 1, p 2..., p N] and q=[q 1, q 2..., q N];
(4) generate thumbnail: utilize bilinear interpolation, image I is normalized into size for the thumbnail of t * t,, further it is transformed into the YCbCr space, get Y component representative image, remember that final thumbnail is R for coloured image;
(5) extract thumbnail feature: R is carried out svd, get its 1st, 2 singular value, be designated as s respectively as characteristic 1And s 2
(6) characteristic normalization: the 1st, 2 singular value, i.e. u using vectorial u and v presentation video piece and thumbnail respectively i=p i(1≤i≤N), u N+1=s 1v i=q i(1≤i≤N), v N+1=s 2, respectively to the element normalization of u and v, i.e. x i=(u iu)/δ u, y i=(v iv)/δ v, μ wherein uAnd μ vBe respectively the average of u and v, δ uAnd δ vBe respectively their standard deviation;
(7) characteristic scramble: under cipher controlled, respectively the top n element of normalized vector x and y is carried out position rearrangement reaction with pseudo-random generator, and it is constant to keep N+1 element, obtains vector x behind the scramble ' and y ';
(8) Hash extracts, and calculates
Figure BSA00000430364500031
(1≤i≤N), can obtain image Hash h=[h 1, h 2..., h N];
(9) similarity is judged, establishes h (1)And h (2)Be respectively two image Hash sequences, h i (1)And h i (2)I element representing them respectively calculates the L1 norm
Figure BSA00000430364500032
If d, thinks h less than setting threshold T (1)And h (2)Pairing image is identical, otherwise thinks different images.
The present invention compared with prior art has following conspicuous outstanding substantive distinguishing features and marked improvement: the present invention uses svd to extract image information, gets most important two singular values of image block as characteristic; Introduce image thumbnails as a reference, with the distance of image block singular value and thumbnail singular value as hash value; The image Hash that extracts is sane to common digital processings such as JPEG compression, comfort noise interference, brightness adjustment, contrast enhancings, and has good uniqueness.
Description of drawings
Fig. 1 is a width of cloth test pattern of using in the embodiment of the invention, and size is 600 * 400;
Fig. 2 is the other piece image of using in the embodiment of the invention;
Fig. 3 carries out the result that size block is formatted to Fig. 1;
Fig. 4 is Y component (luminance component) result who gets Fig. 3, also promptly Fig. 1 is carried out pretreated net result;
Fig. 5 is the piecemeal synoptic diagram of Fig. 4;
Fig. 6 is the thumbnail of Fig. 1;
Fig. 7 is the statistical Butut of L1 norm among the embodiment.
Embodiment
Below in conjunction with accompanying drawing a preferred embodiment of the present invention is elaborated, but protection scope of the present invention is not limited to following embodiment.
Embodiment:
Present embodiment comprises robustness checking and uniqueness checking two parts.Robustness checking is through judging whether similar realization of the pairing image Hash of Fig. 1 and Fig. 2; Wherein Fig. 2 obtains through Fig. 1 is carried out continuous digital processing, comprises that JPEG compression (quality factor is 60), brightness adjustment (adjusting range is 20), contrast strengthen (adjusting range is 20) and white Gaussian noise (average is 0, variance be 0.01).In the step below, (1)~(8) are the steps of extracting the Hash of Fig. 1, extract step and Fig. 1 identical of the Hash of Fig. 2, repeated description no longer, and (9) are the similarity judgement of two image Hash, concrete steps are following:
(1) image pre-service: with bilinear interpolation Fig. 1 is normalized into 256 * 256 sizes, the result is as shown in Figure 3; Fig. 3 is transformed into the YCbCr space representation, gets Y component representative image, obtain pretreated result, as shown in Figure 4;
(2) image block: it is 64 * 64 non overlapping blocks that Fig. 4 is divided into size, obtains 16 image blocks altogether, and Fig. 5 is the piecemeal synoptic diagram;
(3) computed image block feature: above-mentioned 16 image blocks are carried out svd successively, and the 1st, 2 singular value of getting each image block is as characteristic, so can obtain the proper vector p and the q of image:
p=[13618.85,12438.3281,6800.47315,5791.30954,13182.7201,12360.2039,7554.88336,7234.64,12772.461,11346.9951,6586.04545,7960.01579,8250.24471,5453.8304,5120.26638,5752.40614],
q=[130.76731,623.10121,484.34539,381.7512,112.65023,516.03795,665.47482,606.93448,193.00764,971.94397,844.79315,288.13595,1315.9135,163.94719,247.47046,221.32931]
(4) generate thumbnail: utilizing bilinear interpolation that Fig. 1 is normalized into size is 64 * 64, is transformed into the YCbCr space simultaneously, representes with the Y component, obtains thumbnail as shown in Figure 6;
(5) extract thumbnail feature: Fig. 6 is carried out svd, obtain the 1st, 2 singular value, i.e. s 1=9323.15671, s 2=130.76731;
(6) characteristic normalization: with the 1st, 2 singular value of vectorial u and v presentation video piece and thumbnail, promptly
u=[13618.85,12438.3281,6800.47315,5791.30954,13182.7201,12360.2039,7554.88336,7234.64,12772.461,11346.9951,6586.04545,7960.01579,8250.24471,5453.8304,5120.26638,5752.40614,9323.15671],
v=[130.76731,623.10121,484.34539,381.7512,112.65023,516.03795,665.47482,606.93448,193.00764,971.94397,844.79315,288.13595,1315.9135,163.94719,247.47046,221.32931,130.76731]
U and v are carried out normalization obtain vector x and y:
x=[1.5486,1.16,-0.69593,-1.0281,1.4051,1.1343,-0.44758,-0.553,1.27,0.80075,-0.76651,-0.31421,-0.21867,-1.1392,-1.249,-1.0409,0.13452],
y=[-0.97634,0.46352,0.057717,-0.24232,-1.0293,0.1504,0.58744,0.41624,-0.79432,1.4837,1.1119,-0.51611,2.4897,-0.8793,-0.63504,-0.71149,-0.97634]
(7) characteristic scramble: preceding 16 elements to normalized vector x and y carry out position rearrangement reaction, and it is constant to keep the 17th element, obtain vector x behind the scramble ' and y ':
x′=[-0.69593,1.16,-0.31421,-1.249,-1.0409,-0.76651,1.5486,0.80075,1.4051,-0.21867,-1.0281,-0.44758,-1.1392,-0.553,1.1343,1.27,0.13452],
y′=[0.71149,-1.0293,1.1119,-0.24232,-0.51611,0.58744,-0.79432,2.4897,1.4837,-0.63504,-0.97634,0.41624,0.1504,-0.8793,0.057717,0.46352,-0.97634]
(8) Hash extracts, and calculates
Figure BSA00000430364500051
(1≤i≤16) can obtain the image Hash:h of Fig. 1 (1)=[0.87166,1.0269,2.1359,1.5662,1.2623,1.8048,1.4258,3.5295,2.7688,0.49116,1.1627,1.5093,1.7006,0.69434,1.4383,1.8337].
(9) similarity is judged, the image Hash that extracts Fig. 2 obtains h (2)=[0.9612,1.1092,2.3191,1.7667,1.4140,2.0047,1.1778,3.5129,2.8024,0.7206,1.1775,1.7879,1.8365,0.7194,1.6644,1.9184]; Setting threshold T=1.0 calculates h (1)And h (2)The L1 norm, obtain d=0.64987; Because d less than T, therefore can think that Fig. 1 and Fig. 2 are similar images.
As test data, (get M=256, t=64) and calculate the L1 norm between Hash in twos, have 4950 results, its statistical Butut is as shown in Figure 7 to extract their image Hash with 100 width of cloth different images (size is 256 * 256~1994 * 2592) in the present invention.Wherein, minor increment is 1.6458, and ultimate range is 7.5218, is 4.3755 apart from average, and standard deviation is 0.8587.Find from embodiment, the Hash of any two width of cloth different images, its distance explains that all greater than setting threshold T=1.0 the present invention has uniqueness preferably.

Claims (2)

1. the image Hash method based on thumbnail and svd is characterized in that: earlier to the input picture pre-service, carry out non-overlapped piecemeal again; Then svd is applied to each image block, gets the 1st and the 2nd singular value, convert to input picture with image block image of the same size and get luminance component and represent with bilinear interpolation as block feature; Generate the thumbnail of original image, simultaneously svd is applied to thumbnail, get the 1st and the 2nd singular value as characteristic; With the characteristic value normalization of image block and thumbnail, and the characteristic sequence of image block being carried out position rearrangement reaction, is benchmark with the 1st, 2 singular value of thumbnail; Calculate every pair of singular value and its Euclidean distance, all distance values of contacting are image Hash, when judging two image Hash similaritys; Calculate their L1 norm; If less than setting threshold, think the image similarity that it is corresponding, otherwise think different images.
2. the image Hash method based on thumbnail and svd according to claim 1, it is characterized in that: concrete steps are following:
(1) image pre-service: to input picture ICarry out pre-service, comprise picture size normalization and color space conversion, adopt bilinear interpolation earlier, picture specification is changed into M* MSize; If be input as coloured image, then it is transformed into the YCbCr space, with Y component representative image, remember that pretreated image does J
(2) image block: will JBeing divided into size does t* tNon overlapping blocks, one is total N= M 2/ t 2Individual image block during picture specification, is got MFor tIntegral multiple, by from left to right inferior ordered pair piecemeal numbering from top to bottom, remember the iIndividual image block does B i (1≤ iN);
(3) computed image block feature: establish B i Svd be designated as [ U i S i V i ]=SVD ( B i ), wherein U i And V i Be unitary matrix, S i Be diagonal matrix, S i Element on the diagonal line does B i Singular value, get B i The the 1st, 2 singular value as the image block characteristic, be designated as respectively p i With q i , promptly p i = S i (1,1) and q i = S i (2,2), the 1st, 2 characteristic of the image block of contacting respectively can obtain describing the proper vector of entire image p=[ p 1, p 2..., p N ] and q=[ q 1, q 2..., q N ];
(4) generate thumbnail: utilize bilinear interpolation, with image IBeing normalized into size does t* tThumbnail, for coloured image, it is transformed into the YCbCr space, get YThe component representative image remembers that final thumbnail does R
(5) extract thumbnail feature: right RCarry out svd, get its 1st, 2 singular value, be designated as respectively as characteristic s 1With s 2
(6) characteristic normalization: use vector respectively uWith vThe characteristic of presentation video piece and image thumbnails, promptly u i = p i (1≤ iN), u N+ 1 = s 1 v i = q i (1≤ iN), v N+ 1 = s 2, right respectively uWith vElement carry out normalization, promptly x i =( u i μ u)/ δ u(1≤i≤N+1), y i =( v i μ v)/ δ v(1≤i≤N+1), wherein, μ uWith μ vBe respectively the average of u and v, δ uAnd δ vBe respectively their standard deviation;
(7) characteristic scramble: under cipher controlled, with pseudo-random generator respectively to normalized vector xWith yBefore NIndividual element carries out position rearrangement reaction, and keeps N+ 1 element is constant, obtains vector behind the scramble x' with y';
(8) Hash extracts: calculate
Figure DEST_PATH_FSA00000430364400011
(1≤ iN), can obtain image Hash h=[ h 1, h 2..., h N ];
(9) similarity is judged: establish h (1)With h (2)Be respectively two image Hash sequences, h i (1)With h i (2)Represent their respectively iIndividual element, computed range
Figure 734219DEST_PATH_IMAGE001
If, dLess than setting threshold T, think h (1)With h (2)Pairing image similarity, otherwise think different images.
CN201110033139A 2011-01-29 2011-01-29 Image Hash method based on thumbnail and singular value decomposition Expired - Fee Related CN102129549B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110033139A CN102129549B (en) 2011-01-29 2011-01-29 Image Hash method based on thumbnail and singular value decomposition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110033139A CN102129549B (en) 2011-01-29 2011-01-29 Image Hash method based on thumbnail and singular value decomposition

Publications (2)

Publication Number Publication Date
CN102129549A CN102129549A (en) 2011-07-20
CN102129549B true CN102129549B (en) 2012-09-05

Family

ID=44267629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110033139A Expired - Fee Related CN102129549B (en) 2011-01-29 2011-01-29 Image Hash method based on thumbnail and singular value decomposition

Country Status (1)

Country Link
CN (1) CN102129549B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102881008B (en) * 2012-08-16 2016-06-01 广西师范大学 Based on the anti-rotation image Hash method of annulus statistical nature
CN104778689B (en) * 2015-03-30 2018-01-05 广西师范大学 A kind of image hashing method based on average secondary image and locality preserving projections
CN106179992B (en) * 2016-08-26 2018-04-13 保定市立中车轮制造有限公司 A kind of wheel hub Automated Sorting System and its method for sorting
CN109598726A (en) * 2018-10-26 2019-04-09 哈尔滨理工大学 A kind of adapting to image target area dividing method based on SLIC
CN109685112A (en) * 2018-11-29 2019-04-26 昆明理工大学 It is a kind of based on color difference algorithm determination method similar with the image of DHash

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030293A (en) * 2007-03-30 2007-09-05 西安电子科技大学 Digital watermark method against geometrical attack based on image characteristic region
WO2009046438A1 (en) * 2007-10-05 2009-04-09 Dolby Laboratories Licensing Corp. Media fingerprints that reliably correspond to media content
CN101702230A (en) * 2009-11-10 2010-05-05 大连理工大学 Stable digital watermark method based on feature points
CN101710334A (en) * 2009-12-04 2010-05-19 大连理工大学 Large-scale image library retrieving method based on image Hash

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030293A (en) * 2007-03-30 2007-09-05 西安电子科技大学 Digital watermark method against geometrical attack based on image characteristic region
WO2009046438A1 (en) * 2007-10-05 2009-04-09 Dolby Laboratories Licensing Corp. Media fingerprints that reliably correspond to media content
CN101702230A (en) * 2009-11-10 2010-05-05 大连理工大学 Stable digital watermark method based on feature points
CN101710334A (en) * 2009-12-04 2010-05-19 大连理工大学 Large-scale image library retrieving method based on image Hash

Also Published As

Publication number Publication date
CN102129549A (en) 2011-07-20

Similar Documents

Publication Publication Date Title
Wong A watermark for image integrity and ownership verification
Yang et al. Source camera identification based on content-adaptive fusion residual networks
Tang et al. Robust image hashing using ring-based entropies
Tang et al. Robust image hash function using local color features
Mushtaq et al. Digital image forgeries and passive image authentication techniques: a survey
Murali et al. Comparision and analysis of photo image forgery detection techniques
Hakimi et al. Image splicing forgery detection using local binary pattern and discrete wavelet transform
CN102129549B (en) Image Hash method based on thumbnail and singular value decomposition
WO2012041063A1 (en) System and method for image authentication
Bharti et al. A survey of image forgery detection techniques
Armas Vega et al. Copy-move forgery detection technique based on discrete cosine transform blocks features
WO2008143768A1 (en) Deriving video signatures that are insensitive to picture modification and frame-rate conversion
CN102903071A (en) Watermark adding method and system as well as watermark identifying method and system
Abdulrahman et al. Color images steganalysis using RGB channel geometric transformation measures
Sharma et al. Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: an evaluation
Sharma et al. Image forgery and it’s detection technique: a review
CN108038488B (en) Robustness image hashing method based on SIFT and LBP mixing
Tang et al. Perceptual image hashing with histogram of color vector angles
Saikia et al. Image authentication under geometric attacks via concentric square partition based image hashing
Hong et al. A color image authentication scheme with grayscale invariance
Das et al. Blind detection method for video inpainting forgery
CN102881008A (en) Circular loop statistic characteristic-based anti-rotation image Hash method
Govindaraj et al. Ring partition and DWT based perceptual image hashing with application to indexing and retrieval of near-identical images
Ustubıoglu et al. Image forgery detection using colour moments
Mishra et al. Detection of clones in digital images

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120905

Termination date: 20190129