Image Fingerprinting Based on Improved Image Normalization and DFT

Article Preview

Abstract:

As a new image copyright protection technique, a novel image fingerprinting algorithm based on improved image normalization and DFT is proposed in this paper. We first research the DFT amplitude coefficients deeply and improve the traditional image normalization method to fit for more general images, including aspect ratio and rotated angle estimation and correction schemes before normalizing the image. Then combine the improved image normalization method and DFT together to extract the image fingerprint according to the DFT amplitude coefficients. Compared with others’ achievements, our method performs better in resisting common image processing attacks and geometric distortions, also some kinds of combined distortions.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

4759-4764

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Shijun X., Hyoung-JJoong K., Jiwu H. Histogram-Based Image Hashing Scheme Robust Against Geometric Deformations,. Proceedings of the ACM workshop on multimedia and security, pp.121-128, (2007).

DOI: 10.1145/1288869.1288886

Google Scholar

[2] Yong Soo C., Jong Hyuk P. Image Hash generation method using hierarchical histogram,. Multimedia tools and applications, pp.181-194, (2012).

DOI: 10.1007/s11042-010-0724-7

Google Scholar

[3] Ching-Yung L., Shih-Fu C. Robust Digital Signature for Multimedia authentication,. IEEE Circuits and Systems Magazine, vol. 3, pp.23-26, (2003).

DOI: 10.1109/mcas.2003.1267067

Google Scholar

[4] Rui-Xin Z., Chau K. Y., Zhe-Ming L., Bei-Bei L., Ip W. H. Robust Image Hashing for Image Authentication Based on DCT-DWT Composite Domain,. International Conference on Intelligent Systems Design and Applications, vol. 2, pp.119-122, (2008).

DOI: 10.1109/isda.2008.66

Google Scholar

[5] Swaminathan A., Mao Y., Wu M. Robust and Secure Image Hashing,. IEEE transactions on Information Forensics and Security, vol. 1, pp.215-230, (2006).

DOI: 10.1109/tifs.2006.873601

Google Scholar

[6] Yangqiang L., Yuangen W., Jiwu H. Robust image hash in Radon transform domain for authentication,. Signal Processing: Image Communication, vol. 26, pp.280-288, (2011).

DOI: 10.1016/j.image.2011.04.007

Google Scholar

[7] Ramirez-Gutierrez, K., Nakano-Miyatake, M., Perez-Meana, H. Improvement of Radon-based Image Hashing using Image Normalization,. IEEE Electronics, Robotics and Automotive Mechanics Conference, pp.173-177, (2011).

DOI: 10.1109/cerma.2011.34

Google Scholar

[8] Hernandez, R. A. P., Miyatake, M. N., Kurkoski, B. M. Robust Image Hashing Using Image Normalization and SVD Decomposition, IEEE International Midwest Symposium on Circuits and Systems, pp.1-4, (2011).

DOI: 10.1109/mwscas.2011.6026372

Google Scholar

[9] Monga V., Mihcak M. K. Robust and Secure Image Hashing via Non-Negtive Matrix Factorizations,. IEEE transactions on Information Forensics and Security, vol. 2, pp.376-390, (2007).

DOI: 10.1109/tifs.2007.902670

Google Scholar

[10] Monga V., Evans B. L. Perceptual Image Hashing via Feature Points: Performance Evaluation and Tradeoffs,. IEEE transactions on Image Processing, vol. 15, pp.3453-3466, (2006).

DOI: 10.1109/tip.2006.881948

Google Scholar

[11] O'Ruanaidh, J.J.K., Pun, T. Rotation, Scale and Translation Invariant Digital Image Watermarking,. International Conference on Image Processing, vol. 1, pp.536-539, (1997).

DOI: 10.1109/icip.1997.647968

Google Scholar

[12] http: /www. cs. washington. edu/research/imagedatabase/groundtruth/_tars. for. download.

Google Scholar