Access the full text.
Sign up today, get DeepDyve free for 14 days.
Y Lei, Y Wang, J Huang (2011)
Robust image hash in Radon transform domain for authenticationSignal Processing Image Commun, 26
W Shuo-zhong, Z Xin-peng (2007)
Recent development of perceptual image hashingJ of Shanghai Univ, 11
L Ching-Yung, C Shih-Fu (2001)
A robust image authentication method distinguishing JPEG compression from malicious manipulationIEEE Trans Circuits Syst Video Technol, 11
Z Tang, S Wang, X Zhang, W Wei, Y Zhao (2011)
Lexicographical framework for image hashing with implementation based on DCT and NMFMultimed Tools Appl, 52
H Farid (2009)
A survey of image forgery detectionIEEE Signal Process Mag, 2
T Ahonen, A Hadid, M Pietikainen (2006)
Face description with local binary patterns: application to face recognitionIEEE Transa Pattern Anal Mach Intell, 28
C Qin, C-C Chang, P-L Tsou (2013)
Robust image hashing using non-uniform sampling in discrete fourier domainDigital Signal Process, 23
M Heikkila, M Pietikainen (2006)
A texture-based method for modeling the background and detecting moving objectsIEEE Trans Pattern Anal Mach Intell, 28
R Sun, W Zeng (2014)
Secure and robust image hashing via compressive sensingMultimed Tools Appl, 70
A Haouzia, R Noumeir (2008)
Methods for image authentication: a surveyMultimed Tools Appl, 39
Z Guoying, T Ahonen, J Matas, M Pietikainen (2012)
Rotation-invariant image and video description with local binary pattern featuresIEEE Trans Image Proc, 21
C Shan, S Gong, PW McOwan (2009)
Facial expression recognition based on local binary patterns: a comprehensive studyImage Vis Comput, 27
W Liu, Y Wang, S Li (2011)
LBP feature extraction for facial expression recognitionJ Inf Compu Sci, 8
GK Birajdar, VH Mankar (2013)
Digital image forgery detection using passive techniques: a surveyDigit Investig, 10
T Ojala, M Pietikäinen, D Harwood (1996)
A comparative study of texture measures with classification based on featured distributionsPattern Recogn, 29
T Ojala, M Pietikäinen, T Mäenpää (2002)
Multiresolution gray-scale and rotation invariant texture classification with local binary patternsIEEE Trans Pattern Anal Mach Intell, 24
M Heikkilä, M Pietikäinen, C Schmid (2009)
Description of interest regions with local binary patternsPattern Recogn, 42
R Davarzani, K Yaghmaie, S Mozaffari, M Tapak (2013)
Copy-move forgery detection using multiresolution local binary patternsForensic Sci Int, 231
V Monga, MK Mihcak (2007)
Robust and secure image hashing via Non-negative matrix factorizationsIEEE Trans Inf Forensics and Secur, 2
Perceptual image hashing finds increasing attention in several multimedia security applications such as image identification/authentication, tamper detection, and watermarking. Robust feature extraction is the main challenge in hashing schemes. Local binary pattern (LBP) is a new feature which is due to its simplicity, discriminative power, computational efficiency, and robustness to illumination changes has been used in various image applications. In this paper, we propose a robust image hashing scheme using center-symmetric local binary patterns (CSLBP). In the proposed image hashing, CSLBP features are extracted from each non-overlapping block within the original gray-scale image. For each block, the final hash code is obtained by inner product of its CSLBP feature vector and a pseudorandom weight vector. Furthermore, singular value decomposition (SVD) is combined with CSLBP to introduce a more robust hashing method called SVD-CSLBP. Performances of the proposed hashing schemes are evaluated with two groups of popular applications in perceptual image hashing schemes: image identification and image authentication. Experimental results show that the proposed methods are robust to a wide range of distortions and attacks such as additive noise, blurring, brightness changes and JPEG compression. Moreover, the proposed methods have this capability to localize the tampering area, which is not possible in all hashing schemes.
Multimedia Tools and Applications – Springer Journals
Published: Mar 3, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.