Abstract
Computer network has greatly changed the life and work of people, the demand of people for information has been developed from the single text message to the current graphics, images, audio, video and other digital multimedia forms. With the development of a large number of multimedia applications, the digital image is easy to be operated and tampered, this paper aims to study an image fingerprint algorithm based on the masking characteristics of the human eye. An image sensing Hash algorithm based on human visual model is proposed to effectively eliminate the influence of geometric attacks. Watson visual model is used to deal with the DCT coefficients to produce the image fingerprint sequences, which has excellent robustness and security. The experiment proves that the algorithm can certify the copyright of the image, reduce geometric attacks, JPEG compression and other attacks, it can also use the key to generate the pseudo-random matrix, so as to encrypt the image, and effectively realize the security of the algorithm.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Shuihua, H., Chu, C.H.: Content-based image authentication: current status, issues, and challenges. Int. J. Inf. Secur. 9(2), 19–32 (2010)
Kalker, T., Haitsma, J., Oostveen, J.C.: Issues with digital water-marking and perceptual hashing. In: Multimedia System Application IV. Denver, Co, USA, vol. 4518, pp. 189–197 (2001)
Xiamu, N., Yuhua, J.: Perception of Hashi. Electron. J. 36(7), 1405–1411 (2008)
Arnia, F., Munadi, K., Fujiyoshi, M., et al.: Efficient content-based copy detection using signs of DCT coefficient. In: IEEE Symposium on Industrial Electronics and Applications (IEIEA). Kuala Lumpur, Malaysia, vol. 1, pp. 494–499 (2009)
Liu, F., Wang, H., Cheng, L.M., et al.: Enhanced perceptual image authentication with tamper localization and self-restoration. In: IEEE International Conference on Multimedia and Expo (ICME). California, USA, vol. 7, pp. 1–6 (2014)
Prungsinchai, S.: Fourier-Mellin transform for robust image hashing. In: Fourth International Conference on Emerging Security Technology (EST), Cambridge, UK, vol. 40, pp. 58–61 (2013)
Tang, Z., Wang, S., Zhang, X., et al.: Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools and Applications. 52(4), 325–345 (2011)
Qin, C., Wang, S., Zhang, X.: An image picking method based on visual characteristics. Chin. J. Image Graph. 11(11), 1678–1681 (2006)
Hui, Z., Qiong, L.: Hashi algorithm for image sensing based on human visual system. Electron. J. 6(12A), 30–34 (2008)
Hu, Y.: Research on image sensing Hashi algorithm based on visual model, vol. 15, pp. 69–75. Harbin Industrial University, Harbin (2011)
Hu, D., Hu P., Zhang, H.: A perceptual hashing algorithm based on adjustable visual threshold. In: International Conference on Intelligent System Design and Engineering Application, Changsha, China, vol. 15, pp. 133–136 (2010)
Ghouti, L.: Robust perceptual color image hashing using quaternion singular value decomposition. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, vol. 12, pp. 3794–3798 (2014)
Watson, A.B.: DCT quantization matrics visually optimized for individual images. In: Human Vision, Visual Processing, and Digital Display IV. California, USA, vol. 8, pp. 202–216 (1993)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Chi, Z. (2018). Research on Image Fingerprint Technology Based on Watson Visual Model Multimedia Technology. In: Mizera-Pietraszko, J., Pichappan, P. (eds) Lecture Notes in Real-Time Intelligent Systems. RTIS 2016. Advances in Intelligent Systems and Computing, vol 613. Springer, Cham. https://doi.org/10.1007/978-3-319-60744-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-60744-3_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60743-6
Online ISBN: 978-3-319-60744-3
eBook Packages: EngineeringEngineering (R0)