Access the full text.
Sign up today, get DeepDyve free for 14 days.
Perceptual image hashing technique uses the appearance of the digital media object as human eye and generates a fixed size hash value. This hash value works as digital signature for the media object and it is robust against various digital manipulation done on the media object. This technique have been constantly in use in various application areas like content-based image retrieval, image authentication, digital watermarking, image copy detection, tamper detection, image indexing, etc., but it is difficult to generate a perfect perceptual image hash function due to the inverse relationship between its main properties i.e. perceptual robustness and discriminative capability. In this paper, a robust and desirable discrimination capable dual perceptual image hash functions are proposed which use fuzzy color histogram for hash generation. The fuzzy engine needs stable color representation to generate a robust fuzzy color histogram feature which is invariant to various content preserving attacks like gaussian low pass filtering, jpeg compression, etc. To satisfy this, CIE L ∗ a ∗ b ∗ $CIEL^{*}a^{*}b^{*}$ color space forms an good basis as it approximates the human visual system and it is also uniform and device independent color space. The robustness of the fuzzy color histogram is further increased by selecting the most significant bins using an experimentally selected tuning factor and the same is furthermore normalized to make it scale invariant. Our experimentation shows that hash generated with this feature is more stable and able to handle various content preserving attacks and performs better as compared to the latest techniques. Both the proposed systems able to maintain good balance between perceptual robustness with optimal TPR when the FPR ≃ $\simeq $ 0 is 0.8115 and 0.8264 and discrimination capability with the optimal FPR when TPR ≃ $\simeq $ 1 is 0.0618 and 0.0208 respectively.
Multimedia Tools and Applications – Springer Journals
Published: Jun 1, 2018
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.