CN102129549B - Image Hash method based on thumbnail and singular value decomposition - Google Patents
Image Hash method based on thumbnail and singular value decomposition Download PDFInfo
- Publication number
- CN102129549B CN102129549B CN201110033139A CN201110033139A CN102129549B CN 102129549 B CN102129549 B CN 102129549B CN 201110033139 A CN201110033139 A CN 201110033139A CN 201110033139 A CN201110033139 A CN 201110033139A CN 102129549 B CN102129549 B CN 102129549B
- Authority
- CN
- China
- Prior art keywords
- image
- thumbnail
- singular value
- hash
- characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Image Processing (AREA)
Abstract
The invention relates to an image Hash method based on thumbnail and singular value decomposition. The method comprises the following steps of: pre-processing an image and blocking; applying the singular value decomposition to an image block and extracting a first singular value and a second singular value as characteristics; generating the thumbnail of the original image by a bilinear interpolation method and performing the singular value decomposition, and taking the first singular value and the second singular value as the characteristics; normalizing the characteristics of the image block and the thumbnail, and rearranging the positions of the characteristic sequence of the image block; based on the first singular value and the second singular value of the thumbnail, calculating an Euclidean distance between each pair of singular values and the thumbnail, and connecting all the distance values in series, namely during similarity judgment of the image Hash, calculating an L1 norm of two image Hashes; if the L1 norm is smaller than a set threshold value, determining that the corresponding images are similar; and if the L1 norm is greater than or equal to the set threshold value, determining that the corresponding images are different. The method has robustness to common number processing such as joint photographic experts group (JPEG) compression, proper noise interference, brightness regulation, contrast enhancement and the like; and the method has high uniqueness.
Description
Technical field
The present invention relates to signal Processing field and field of computer technology, particularly a kind of image Hash method based on thumbnail and svd.
Background technology
Along with popularizing of image acquisition equipments such as digital camera, digital picture increases by geometric progression, and how effectively the management and retrieval digital picture becomes the problem that people face.Meanwhile, the characteristics that digital picture is easy to duplicate and revise make picture material infringement, distort, problem such as forgery is serious day by day, how to protect problems such as image copyright to become more and more important better.Image Hash (Hash) is a kind of emerging technology of multi-media information security.It identifies this image with the short sequence of extracting in the image, can be widely used in fields such as image authentication, copy detection, digital watermarking, image retrieval.
Because cryptography Hash function such as SHA-1 and MD5 are very responsive to the variation of input data, the change of any 1 bit all can change the hash value of output fully, therefore is not suitable for image.Often will carry out normal digital processing like enhancing, JPEG compression etc. to image in the practical application, material alterations does not take place in its content, hopes that image Hash remains unchanged.Usually, image Hash should satisfy two conditions: 1) perception robustness, and two promptly similar width of cloth images to perception, no matter whether interior data is consistent, their Hash is identical or very approaching with very big probability; 2) uniqueness, promptly different images has pictures different Hash.
Different according to constructing technology, conventional images Hash method roughly is divided into following five types: (1) is based on the method for image statistics; (2) based on the method for invariant relation; (3) based on the method for image rough representation; (4) utilize image low layer semantic feature; (5) utilization matrix decomposition technology.Specifically consult following document:
1.R.Venkatesan,S.-M.Koon,M.H.Jakubowski,et?al.,Robust?image?hashing[C],in?Proc.ofthe?IEEE?International?Conference?on?Image?Processing,2000,3:664-666,Vancouver,BC,Canada,September?10-13,2000.
2.C.Y.Lin?and?S.F.Chang,A?robust?image?authentication?system?distinguishing?JPEGcompression?from?malicious?manipulation[J].IEEE?Transactions?on?Circuits?and?Systems?forVideo?Technology,2001,11(2):153-168.
3.A.Swaminathan,Y.Mao?and?M.Wu,Robust?and?secure?image?hashing[J].IEEETransactions?on?Information?Forensics?and?Security,2006,1(2):215-230.
4.V.Monga?and?B.L.Evans,Perceptual?image?hashing?via?feature?points:performanceevaluation?and?trade-offs[J].IEEE?Transactions?on?Image?Processing,2006,15(11):3453-3466.
5.V.Monga?and?M.K.Mihcak,Robust?and?secure?image?hashing?via?non-negative?matrixfactorizations[J].IEEE?Transactions?on?Information?Forensics?and?Security,2007,2(3):376-390.
Above-mentioned prior art has robustness to some digital processing mostly, like JPEG compression, digital filtering, geometric transformation, but the relatively poor deficiency of ubiquity uniqueness.
Summary of the invention
The object of the present invention is to provide a kind of image Hash method based on thumbnail and svd, this method can extract sane Hash from digital picture, sane to common Flame Image Process, and has good uniqueness.
A kind of image Hash method based on thumbnail and svd earlier to the input picture pre-service, is carried out non-overlapped piecemeal again; Then svd is applied to each image block, gets the 1st and the 2nd singular value, convert to input picture with image block image of the same size and get luminance component and represent with bilinear interpolation as block feature; Generate the thumbnail of original image, simultaneously svd is applied to thumbnail, get the 1st and the 2nd singular value as characteristic; With the characteristic value normalization of image block and thumbnail, and the characteristic sequence of image block being carried out position rearrangement reaction, is benchmark with the 1st, 2 singular value of thumbnail; Calculate all the other every pair singular value and its Euclidean distance, all distance values of contacting are image Hash, when judging two image Hash similaritys; Calculate their L1 norm; If less than setting threshold, think that its corresponding image is identical, otherwise think different images.
The concrete steps of this method are following:
(1) image pre-service: input picture I is carried out pre-service, comprise picture size normalization and color space conversion.Use earlier bilinear interpolation, picture specification is changed into M * M size,, then it is transformed into the YCbCr space, get Y component representative image if be input as coloured image.Remember that pretreated image is J;
(2) image block: J is divided into size is the non overlapping blocks of t * t, a total N=M
2/ t
2Individual image block (image is returned when formatting, and gets the integral multiple that M is t) is numbered by from left to right inferior ordered pair piecemeal from top to bottom, remembers that i image block is B
i(1≤i≤N);
(3) computed image block feature: establish B
iSvd be designated as [U
iS
iV
i]=SVD (B
i), U wherein
iAnd V
iBe unitary matrix, S
iBe diagonal matrix, S
iElement on the diagonal line is B
iSingular value, get B
iThe the 1st, 2 singular value as the image block characteristic, be designated as p respectively
iAnd q
i, i.e. p
i=S
i(1,1) and q
i=S
i(2,2).Contact respectively the 1st, 2 characteristic of image block can obtain describing the proper vector p=[p of entire image
1, p
2..., p
N] and q=[q
1, q
2..., q
N];
(4) generate thumbnail: utilize bilinear interpolation, image I is normalized into size for the thumbnail of t * t,, further it is transformed into the YCbCr space, get Y component representative image, remember that final thumbnail is R for coloured image;
(5) extract thumbnail feature: R is carried out svd, get its 1st, 2 singular value, be designated as s respectively as characteristic
1And s
2
(6) characteristic normalization: the 1st, 2 singular value, i.e. u using vectorial u and v presentation video piece and thumbnail respectively
i=p
i(1≤i≤N), u
N+1=s
1v
i=q
i(1≤i≤N), v
N+1=s
2, respectively to the element normalization of u and v, i.e. x
i=(u
i-μ
u)/δ
u, y
i=(v
i-μ
v)/δ
v, μ wherein
uAnd μ
vBe respectively the average of u and v, δ
uAnd δ
vBe respectively their standard deviation;
(7) characteristic scramble: under cipher controlled, respectively the top n element of normalized vector x and y is carried out position rearrangement reaction with pseudo-random generator, and it is constant to keep N+1 element, obtains vector x behind the scramble ' and y ';
(9) similarity is judged, establishes h
(1)And h
(2)Be respectively two image Hash sequences, h
i (1)And h
i (2)I element representing them respectively calculates the L1 norm
If d, thinks h less than setting threshold T
(1)And h
(2)Pairing image is identical, otherwise thinks different images.
The present invention compared with prior art has following conspicuous outstanding substantive distinguishing features and marked improvement: the present invention uses svd to extract image information, gets most important two singular values of image block as characteristic; Introduce image thumbnails as a reference, with the distance of image block singular value and thumbnail singular value as hash value; The image Hash that extracts is sane to common digital processings such as JPEG compression, comfort noise interference, brightness adjustment, contrast enhancings, and has good uniqueness.
Description of drawings
Fig. 1 is a width of cloth test pattern of using in the embodiment of the invention, and size is 600 * 400;
Fig. 2 is the other piece image of using in the embodiment of the invention;
Fig. 3 carries out the result that size block is formatted to Fig. 1;
Fig. 4 is Y component (luminance component) result who gets Fig. 3, also promptly Fig. 1 is carried out pretreated net result;
Fig. 5 is the piecemeal synoptic diagram of Fig. 4;
Fig. 6 is the thumbnail of Fig. 1;
Fig. 7 is the statistical Butut of L1 norm among the embodiment.
Embodiment
Below in conjunction with accompanying drawing a preferred embodiment of the present invention is elaborated, but protection scope of the present invention is not limited to following embodiment.
Embodiment:
Present embodiment comprises robustness checking and uniqueness checking two parts.Robustness checking is through judging whether similar realization of the pairing image Hash of Fig. 1 and Fig. 2; Wherein Fig. 2 obtains through Fig. 1 is carried out continuous digital processing, comprises that JPEG compression (quality factor is 60), brightness adjustment (adjusting range is 20), contrast strengthen (adjusting range is 20) and white Gaussian noise (average is 0, variance be 0.01).In the step below, (1)~(8) are the steps of extracting the Hash of Fig. 1, extract step and Fig. 1 identical of the Hash of Fig. 2, repeated description no longer, and (9) are the similarity judgement of two image Hash, concrete steps are following:
(1) image pre-service: with bilinear interpolation Fig. 1 is normalized into 256 * 256 sizes, the result is as shown in Figure 3; Fig. 3 is transformed into the YCbCr space representation, gets Y component representative image, obtain pretreated result, as shown in Figure 4;
(2) image block: it is 64 * 64 non overlapping blocks that Fig. 4 is divided into size, obtains 16 image blocks altogether, and Fig. 5 is the piecemeal synoptic diagram;
(3) computed image block feature: above-mentioned 16 image blocks are carried out svd successively, and the 1st, 2 singular value of getting each image block is as characteristic, so can obtain the proper vector p and the q of image:
p=[13618.85,12438.3281,6800.47315,5791.30954,13182.7201,12360.2039,7554.88336,7234.64,12772.461,11346.9951,6586.04545,7960.01579,8250.24471,5453.8304,5120.26638,5752.40614],
q=[130.76731,623.10121,484.34539,381.7512,112.65023,516.03795,665.47482,606.93448,193.00764,971.94397,844.79315,288.13595,1315.9135,163.94719,247.47046,221.32931]
(4) generate thumbnail: utilizing bilinear interpolation that Fig. 1 is normalized into size is 64 * 64, is transformed into the YCbCr space simultaneously, representes with the Y component, obtains thumbnail as shown in Figure 6;
(5) extract thumbnail feature: Fig. 6 is carried out svd, obtain the 1st, 2 singular value, i.e. s
1=9323.15671, s
2=130.76731;
(6) characteristic normalization: with the 1st, 2 singular value of vectorial u and v presentation video piece and thumbnail, promptly
u=[13618.85,12438.3281,6800.47315,5791.30954,13182.7201,12360.2039,7554.88336,7234.64,12772.461,11346.9951,6586.04545,7960.01579,8250.24471,5453.8304,5120.26638,5752.40614,9323.15671],
v=[130.76731,623.10121,484.34539,381.7512,112.65023,516.03795,665.47482,606.93448,193.00764,971.94397,844.79315,288.13595,1315.9135,163.94719,247.47046,221.32931,130.76731]
U and v are carried out normalization obtain vector x and y:
x=[1.5486,1.16,-0.69593,-1.0281,1.4051,1.1343,-0.44758,-0.553,1.27,0.80075,-0.76651,-0.31421,-0.21867,-1.1392,-1.249,-1.0409,0.13452],
y=[-0.97634,0.46352,0.057717,-0.24232,-1.0293,0.1504,0.58744,0.41624,-0.79432,1.4837,1.1119,-0.51611,2.4897,-0.8793,-0.63504,-0.71149,-0.97634]
(7) characteristic scramble: preceding 16 elements to normalized vector x and y carry out position rearrangement reaction, and it is constant to keep the 17th element, obtain vector x behind the scramble ' and y ':
x′=[-0.69593,1.16,-0.31421,-1.249,-1.0409,-0.76651,1.5486,0.80075,1.4051,-0.21867,-1.0281,-0.44758,-1.1392,-0.553,1.1343,1.27,0.13452],
y′=[0.71149,-1.0293,1.1119,-0.24232,-0.51611,0.58744,-0.79432,2.4897,1.4837,-0.63504,-0.97634,0.41624,0.1504,-0.8793,0.057717,0.46352,-0.97634]
(8) Hash extracts, and calculates
(1≤i≤16) can obtain the image Hash:h of Fig. 1
(1)=[0.87166,1.0269,2.1359,1.5662,1.2623,1.8048,1.4258,3.5295,2.7688,0.49116,1.1627,1.5093,1.7006,0.69434,1.4383,1.8337].
(9) similarity is judged, the image Hash that extracts Fig. 2 obtains h
(2)=[0.9612,1.1092,2.3191,1.7667,1.4140,2.0047,1.1778,3.5129,2.8024,0.7206,1.1775,1.7879,1.8365,0.7194,1.6644,1.9184]; Setting threshold T=1.0 calculates h
(1)And h
(2)The L1 norm, obtain d=0.64987; Because d less than T, therefore can think that Fig. 1 and Fig. 2 are similar images.
As test data, (get M=256, t=64) and calculate the L1 norm between Hash in twos, have 4950 results, its statistical Butut is as shown in Figure 7 to extract their image Hash with 100 width of cloth different images (size is 256 * 256~1994 * 2592) in the present invention.Wherein, minor increment is 1.6458, and ultimate range is 7.5218, is 4.3755 apart from average, and standard deviation is 0.8587.Find from embodiment, the Hash of any two width of cloth different images, its distance explains that all greater than setting threshold T=1.0 the present invention has uniqueness preferably.
Claims (2)
1. the image Hash method based on thumbnail and svd is characterized in that: earlier to the input picture pre-service, carry out non-overlapped piecemeal again; Then svd is applied to each image block, gets the 1st and the 2nd singular value, convert to input picture with image block image of the same size and get luminance component and represent with bilinear interpolation as block feature; Generate the thumbnail of original image, simultaneously svd is applied to thumbnail, get the 1st and the 2nd singular value as characteristic; With the characteristic value normalization of image block and thumbnail, and the characteristic sequence of image block being carried out position rearrangement reaction, is benchmark with the 1st, 2 singular value of thumbnail; Calculate every pair of singular value and its Euclidean distance, all distance values of contacting are image Hash, when judging two image Hash similaritys; Calculate their L1 norm; If less than setting threshold, think the image similarity that it is corresponding, otherwise think different images.
2. the image Hash method based on thumbnail and svd according to claim 1, it is characterized in that: concrete steps are following:
(1) image pre-service: to input picture
ICarry out pre-service, comprise picture size normalization and color space conversion, adopt bilinear interpolation earlier, picture specification is changed into
M*
MSize; If be input as coloured image, then it is transformed into the YCbCr space, with Y component representative image, remember that pretreated image does
J
(2) image block: will
JBeing divided into size does
t*
tNon overlapping blocks, one is total
N=
M 2/
t 2Individual image block during picture specification, is got
MFor
tIntegral multiple, by from left to right inferior ordered pair piecemeal numbering from top to bottom, remember the
iIndividual image block does
B i (1≤
i≤
N);
(3) computed image block feature: establish
B i Svd be designated as [
U i S i V i ]=SVD (
B i ), wherein
U i And V i Be unitary matrix,
S i Be diagonal matrix,
S i Element on the diagonal line does
B i Singular value, get
B i The the 1st, 2 singular value as the image block characteristic, be designated as respectively
p i With
q i , promptly
p i = S i (1,1) and
q i = S i (2,2), the 1st, 2 characteristic of the image block of contacting respectively can obtain describing the proper vector of entire image
p=[
p 1,
p 2...,
p N ] and
q=[
q 1,
q 2...,
q N ];
(4) generate thumbnail: utilize bilinear interpolation, with image
IBeing normalized into size does
t*
tThumbnail, for coloured image, it is transformed into the YCbCr space, get
YThe component representative image remembers that final thumbnail does
R
(5) extract thumbnail feature: right
RCarry out svd, get its 1st, 2 singular value, be designated as respectively as characteristic
s 1With
s 2
(6) characteristic normalization: use vector respectively
uWith
vThe characteristic of presentation video piece and image thumbnails, promptly
u i =
p i (1≤
i≤
N),
u N+ 1
=
s 1 v i =
q i (1≤
i≤
N),
v N+ 1
=
s 2, right respectively
uWith
vElement carry out normalization, promptly
x i =(
u i μ u)/
δ
u(1≤i≤N+1),
y i =(
v i μ v)/
δ
v(1≤i≤N+1), wherein,
μ uWith
μ vBe respectively the average of u and v, δ
uAnd δ
vBe respectively their standard deviation;
(7) characteristic scramble: under cipher controlled, with pseudo-random generator respectively to normalized vector
xWith
yBefore
NIndividual element carries out position rearrangement reaction, and keeps
N+ 1 element is constant, obtains vector behind the scramble
x' with
y';
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110033139A CN102129549B (en) | 2011-01-29 | 2011-01-29 | Image Hash method based on thumbnail and singular value decomposition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110033139A CN102129549B (en) | 2011-01-29 | 2011-01-29 | Image Hash method based on thumbnail and singular value decomposition |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102129549A CN102129549A (en) | 2011-07-20 |
CN102129549B true CN102129549B (en) | 2012-09-05 |
Family
ID=44267629
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110033139A Expired - Fee Related CN102129549B (en) | 2011-01-29 | 2011-01-29 | Image Hash method based on thumbnail and singular value decomposition |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102129549B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102881008B (en) * | 2012-08-16 | 2016-06-01 | 广西师范大学 | Based on the anti-rotation image Hash method of annulus statistical nature |
CN104778689B (en) * | 2015-03-30 | 2018-01-05 | 广西师范大学 | A kind of image hashing method based on average secondary image and locality preserving projections |
CN106179992B (en) * | 2016-08-26 | 2018-04-13 | 保定市立中车轮制造有限公司 | A kind of wheel hub Automated Sorting System and its method for sorting |
CN109598726A (en) * | 2018-10-26 | 2019-04-09 | 哈尔滨理工大学 | A kind of adapting to image target area dividing method based on SLIC |
CN109685112A (en) * | 2018-11-29 | 2019-04-26 | 昆明理工大学 | It is a kind of based on color difference algorithm determination method similar with the image of DHash |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101030293A (en) * | 2007-03-30 | 2007-09-05 | 西安电子科技大学 | Digital watermark method against geometrical attack based on image characteristic region |
WO2009046438A1 (en) * | 2007-10-05 | 2009-04-09 | Dolby Laboratories Licensing Corp. | Media fingerprints that reliably correspond to media content |
CN101702230A (en) * | 2009-11-10 | 2010-05-05 | 大连理工大学 | Stable digital watermark method based on feature points |
CN101710334A (en) * | 2009-12-04 | 2010-05-19 | 大连理工大学 | Large-scale image library retrieving method based on image Hash |
-
2011
- 2011-01-29 CN CN201110033139A patent/CN102129549B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101030293A (en) * | 2007-03-30 | 2007-09-05 | 西安电子科技大学 | Digital watermark method against geometrical attack based on image characteristic region |
WO2009046438A1 (en) * | 2007-10-05 | 2009-04-09 | Dolby Laboratories Licensing Corp. | Media fingerprints that reliably correspond to media content |
CN101702230A (en) * | 2009-11-10 | 2010-05-05 | 大连理工大学 | Stable digital watermark method based on feature points |
CN101710334A (en) * | 2009-12-04 | 2010-05-19 | 大连理工大学 | Large-scale image library retrieving method based on image Hash |
Also Published As
Publication number | Publication date |
---|---|
CN102129549A (en) | 2011-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | Source camera identification based on content-adaptive fusion residual networks | |
Wong | A watermark for image integrity and ownership verification | |
Tang et al. | Robust image hashing using ring-based entropies | |
Tang et al. | Robust image hash function using local color features | |
Mushtaq et al. | Digital image forgeries and passive image authentication techniques: a survey | |
Sajjad et al. | Robust image hashing based efficient authentication for smart industrial environment | |
Armas Vega et al. | Copy-move forgery detection technique based on discrete cosine transform blocks features | |
CN103238159A (en) | System and method for image authentication | |
Murali et al. | Comparision and analysis of photo image forgery detection techniques | |
Hakimi et al. | Image splicing forgery detection using local binary pattern and discrete wavelet transform | |
CN102129549B (en) | Image Hash method based on thumbnail and singular value decomposition | |
Bharti et al. | A survey of image forgery detection techniques | |
WO2008143768A1 (en) | Deriving video signatures that are insensitive to picture modification and frame-rate conversion | |
Sharma et al. | Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: an evaluation | |
Sharma et al. | Image forgery and it’s detection technique: a review | |
CN108038488B (en) | Robustness image hashing method based on SIFT and LBP mixing | |
Tang et al. | Perceptual image hashing with histogram of color vector angles | |
Saikia et al. | Image authentication under geometric attacks via concentric square partition based image hashing | |
Hong et al. | A color image authentication scheme with grayscale invariance | |
Das et al. | Blind detection method for video inpainting forgery | |
CN102881008A (en) | Circular loop statistic characteristic-based anti-rotation image Hash method | |
Mishra et al. | Detection of clones in digital images | |
Sandeep et al. | Detection of malicious video modifications using perceptual video hashing | |
Govindaraj et al. | Ring partition and DWT based perceptual image hashing with application to indexing and retrieval of near-identical images | |
Ustubıoglu et al. | Image forgery detection using colour moments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120905 Termination date: 20190129 |