• Title/Summary/Keyword: Image Hashing

Search Result 35, Processing Time 0.021 seconds

Fast Search with Data-Oriented Multi-Index Hashing for Multimedia Data

  • Ma, Yanping;Zou, Hailin;Xie, Hongtao;Su, Qingtang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2599-2613
    • /
    • 2015
  • Multi-index hashing (MIH) is the state-of-the-art method for indexing binary codes, as it di-vides long codes into substrings and builds multiple hash tables. However, MIH is based on the dataset codes uniform distribution assumption, and will lose efficiency in dealing with non-uniformly distributed codes. Besides, there are lots of results sharing the same Hamming distance to a query, which makes the distance measure ambiguous. In this paper, we propose a data-oriented multi-index hashing method (DOMIH). We first compute the covariance ma-trix of bits and learn adaptive projection vector for each binary substring. Instead of using substrings as direct indices into hash tables, we project them with corresponding projection vectors to generate new indices. With adaptive projection, the indices in each hash table are near uniformly distributed. Then with covariance matrix, we propose a ranking method for the binary codes. By assigning different bit-level weights to different bits, the returned bina-ry codes are ranked at a finer-grained binary code level. Experiments conducted on reference large scale datasets show that compared to MIH the time performance of DOMIH can be improved by 36.9%-87.4%, and the search accuracy can be improved by 22.2%. To pinpoint the potential of DOMIH, we further use near-duplicate image retrieval as examples to show the applications and the good performance of our method.

Concealment of iris features based on artificial noises

  • Jiao, Wenming;Zhang, Heng;Zang, Qiyan;Xu, Weiwei;Zhang, Shuaiwei;Zhang, Jian;Li, Hongran
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.599-607
    • /
    • 2019
  • Although iris recognition verification is considered to be the safest method of biometric verification, studies have shown that iris features may be illegally used. To protect iris features and further improve the security of iris recognition and verification, this study applies the Gaussian and Laplacian mechanisms and to hide iris features by differentiating privacy. The efficiency of the algorithm and evaluation of the image quality by the image hashing algorithm are selected as indicators to evaluate these mechanisms. The experimental results indicate that the security of an iris image can be significantly improved using differential privacy protection.

Concentric Circle-Based Image Signature for Near-Duplicate Detection in Large Databases

  • Cho, A-Young;Yang, Won-Keun;Oh, Weon-Geun;Jeong, Dong-Seok
    • ETRI Journal
    • /
    • v.32 no.6
    • /
    • pp.871-880
    • /
    • 2010
  • Many applications dealing with image management need a technique for removing duplicate images or for grouping related (near-duplicate) images in a database. This paper proposes a concentric circle-based image signature which makes it possible to detect near-duplicates rapidly and accurately. An image is partitioned by radius and angle levels from the center of the image. Feature values are calculated using the average or variation between the partitioned sub-regions. The feature values distributed in sequence are formed into an image signature by hash generation. The hashing facilitates storage space reduction and fast matching. The performance was evaluated through discriminability and robustness tests. Using these tests, the particularity among the different images and the invariability among the modified images are verified, respectively. In addition, we also measured the discriminability and robustness by the distribution analysis of the hashed bits. The proposed method is robust to various modifications, as shown by its average detection rate of 98.99%. The experimental results showed that the proposed method is suitable for near-duplicate detection in large databases.

Copy-move Forgery Detection Robust to Various Transformation and Degradation Attacks

  • Deng, Jiehang;Yang, Jixiang;Weng, Shaowei;Gu, Guosheng;Li, Zheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4467-4486
    • /
    • 2018
  • Trying to deal with the problem of low robustness of Copy-Move Forgery Detection (CMFD) under various transformation and degradation attacks, a novel CMFD method is proposed in this paper. The main advantages of proposed work include: (1) Discrete Analytical Fourier-Mellin Transform (DAFMT) and Locality Sensitive Hashing (LSH) are combined to extract the block features and detect the potential copy-move pairs; (2) The Euclidian distance is incorporated in the pixel variance to filter out the false potential copy-move pairs in the post-verification step. In addition to extracting the effective features of an image block, the DAMFT has the properties of rotation and scale invariance. Unlike the traditional lexicographic sorting method, LSH is robust to the degradations of Gaussian noise and JEPG compression. Because most of the false copy-move pairs locate closely to each other in the spatial domain or are in the homogeneous regions, the Euclidian distance and pixel variance are employed in the post-verification step. After evaluating the proposed method by the precision-recall-$F_1$ model quantitatively based on the Image Manipulation Dataset (IMD) and Copy-Move Hard Dataset (CMHD), our method outperforms Emam et al.'s and Li et al.'s works in the recall and $F_1$ aspects.

Performance Analysis of Brightness-Combined LLAH (밝기 정보를 결합한 LLAH의 성능 분석)

  • Park, Hanhoon;Moon, Kwang-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.138-145
    • /
    • 2016
  • LLAH(Locally Likely Arrangement Hashing) is a method which describes image features by exploiting the geometric relationship between their neighbors. Inherently, it is more robust to large view change and poor scene texture than conventional texture-based feature description methods. However, LLAH strongly requires that image features should be detected with high repeatability. The problem is that such requirement is difficult to satisfy in real applications. To alleviate the problem, this paper proposes a method that improves the matching rate of LLAH by exploiting together the brightness of features. Then, it is verified that the matching rate is increased by about 5% in experiments with synthetic images in the presence of Gaussian noise.

Image Hashing Techniques Utilizing User-Defined Image Invariant Features (사용자에 의한 영상 불변 특징을 이용한 이미지 해쉬 기술)

  • Choi, YongSoo;Kim, HyoungJoong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.514-517
    • /
    • 2010
  • 이미지 해쉬는 기술자(Descriptor) 또는 구분자(Identifier)로서 영상의 유사성을 측정하는데 사용될 수 있다. 수많은 이미지 해쉬 기술들이 있지만, 그 중에서도 히스토그램 기반의 방법들이 일반적인 영상처리나 다양한 기하학적 공격들에 강인함을 보여준다. 이 논문에서는 강인한 히스토그램 기반 이미지 해쉬를 생성하기 위하여 영상의 양자화, 사용자 지정 윈도우를 적용하여 영상의 특성화 과정을 적용하며 해쉬 값 결정 알고리즘도 오류에 강하도록 설계하였다. 이러한 기술은 기존의 논문들이 보여주었던 성능을 향상시킨다. 특히, 통계적인 오류측정을 통해 수행결과를 설명함으로서 수행성능의 향상을 객관적으로 평가하였다.

Implementation of System Retrieving Multi-Object Image Using Property of Moments (모멘트 특성을 이용한 다중 객체 이미지 검색 시스템 구현)

  • 안광일;안재형
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.5
    • /
    • pp.454-460
    • /
    • 2000
  • To retrieve complex data such as images, the content-based retrieval method rather than keyword based method is required. In this paper, we implemented a content-based image retrieval system which retrieves object of user query effectively using invariant moments which have invariant properties about linear transformation like position transition, rotation and scaling. To extract the shape feature of objects in an image, we propose a labeling algorithm that extracts objects from an image and apply invariant moments to each object. Hashing method is also applied to reduce a retrieval time and index images effectively. The experimental results demonstrate the high retrieval efficiency i.e precision 85%, recall 23%. Consequently, our retrieval system shows better performance than the conventional system that cannot express the shale of objects exactly.

  • PDF

Pedestrian Detection using YOLO and Tracking (얼굴 이미지 검색을 위한 Product Quantization 기반의 깊은 신경망 피쳐 매칭)

  • Jang, Young Kyun;Lee, Seok Hee;Cho, Nam Ik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.06a
    • /
    • pp.246-248
    • /
    • 2019
  • 최근 딥 러닝을 이용한 방법들이 이미지 분류에서 뛰어난 성능을 보임에 따라, 컴퓨터 비전의 중요한 문제 중 하나인 이미지 검색에도 이를 활용하고 있다. 특히, 이미지 검색에 사용할 수 있는 이미지 기술자 (Image descriptor)를 깊은 신경망 구조의 일부분인 Fully-connected layer에서 추출하여 사용하는 방법들이 제시되고 있고, 이를 위해 알맞은 목적함수를 설계하여 깊은 신경망을 학습하는 것이 중요해지고 있다. 딥 러닝을 통해 얻은 이미지 기술자는 실수형 데이터로서, 한 장의 이미지를 수치화하여 표현하는 데 많은 메모리를 소모하게 된다. 이를 보완하기 위해 이미지 기술자를 작은 용량의 이진코드로 mapping 하는 해싱 (hashing) 이라는 과정이 필수적이나 이에 따른 한계점이 발생한다. 본 연구에서는 실수형 데이터가 갖는 거리 계산에서의 이점과 이진코드의 장점을 동시에 살릴 수 있는 Product Quantization 방식의 이미지 검색 방법을 이용하여 한계점을 극복하였다. 우리는 제안한 방법을 얼굴 이미지 데이터 셋에 실험하였고 기존 방식보다 뛰어난 성능을 보이는 것을 확인할 수 있었다.

  • PDF

Augmenting Text Document by Controlling Its IR-Reflectance (적외선 반사 특성 제어를 통한 텍스트 문서 증강)

  • Park, Hanhoon;Moon, Kwang-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.6
    • /
    • pp.882-892
    • /
    • 2017
  • Locally Likely Arrangement Hashing (LLAH) is a method that describes image features based on the geometry between their neighbors. Thus, it has been preferred to implement augmented reality on poorly-textured objects such as text documents. However, LLAH strongly requires that image features be detected with high repeatability and located at a distance from one another. To fulfill the requirement for text document, this paper proposes a method that facilitates the word detection in infrared (IR) range by adjusting the IR-reflectance of words. Specifically, the words are printed out with two different black inks: one is using the K(carbon black) ink only, the other is mixing the C(cyan), M(magenta), Y(yellow) inks. Since only the words printed out with the K ink is visible in IR range, a part of words are selected in advance to be used as features and printed out the K ink. The selected words can be robustly detected with high repeatability in IR range and this enables to implement augmented reality on text documents with high fidelity. The validity of the proposed method was verified through experiments.

CCTV-Based Multi-Factor Authentication System

  • Kwon, Byoung-Wook;Sharma, Pradip Kumar;Park, Jong-Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.904-919
    • /
    • 2019
  • Many security systems rely solely on solutions based on Artificial Intelligence, which are weak in nature. These security solutions can be easily manipulated by malicious users who can gain unlawful access. Some security systems suggest using fingerprint-based solutions, but they can be easily deceived by copying fingerprints with clay. Image-based security is undoubtedly easy to manipulate, but it is also a solution that does not require any special training on the part of the user. In this paper, we propose a multi-factor security framework that operates in a three-step process to authenticate the user. The motivation of the research lies in utilizing commonly available and inexpensive devices such as onsite CCTV cameras and smartphone camera and providing fully secure user authentication. We have used technologies such as Argon2 for hashing image features and physically unclonable identification for secure device-server communication. We also discuss the methodological workflow of the proposed multi-factor authentication framework. In addition, we present the service scenario of the proposed model. Finally, we analyze qualitatively the proposed model and compare it with state-of-the-art methods to evaluate the usability of the model in real-world applications.