IEEE Transactions on Information Forensics and Security,
vol. 1, no. 1, pp. 68-79, Mar. 2006.
A Clustering Based Approach to Perceptual Image Hashing
Vishal Monga,
Arindam Banerjee, and
Brian L. Evans
Center for Perceptual Systems,
The University of Texas at Austin,
Austin, TX 78712 USA
Vishal.Monga@xeroxlabs.com -
abanerje@ece.utexas.edu -
bevans@ece.utexas.edu
Paper -
Software
Image Hashing Research
at UT Austin
Abstract
A perceptual image hash function maps an image to a short binary
string based on an image's appearance to the human eye. Perceptual
image hashing is useful in image databases, watermarking, and
authentication. In this paper, we decouple image hashing into
feature extraction (intermediate hash) followed by data clustering
(final hash). We show that the decision version of our clustering
problem is NP complete. Then, for any perceptually significant
feature extractor, we propose a polynomial-time heuristic
clustering algorithm that automatically determines the final hash
length needed to satisfy a specified distortion. Based on the
proposed algorithm, we develop two variations to facilitate
perceptual robustness vs. fragility trade-offs. We validate the
perceptual significance of our hash by testing under Stirmark
attacks. Finally, we develop randomized clustering algorithms for
the purposes of secure image hashing.
COPYRIGHT NOTICE: All the documents on this server
have been submitted by their authors to scholarly journals or conferences
as indicated, for the purpose of non-commercial dissemination of
scientific work.
The manuscripts are put on-line to facilitate this purpose.
These manuscripts are copyrighted by the authors or the journals in which
they were published.
You may copy a manuscript for scholarly, non-commercial purposes, such
as research or instruction, provided that you agree to respect these
copyrights.
Last Updated 07/17/06.