Skip to main content

Research on Image Fingerprint Technology Based on Watson Visual Model Multimedia Technology

  • Conference paper
  • First Online:
  • 1654 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 613))

Abstract

Computer network has greatly changed the life and work of people, the demand of people for information has been developed from the single text message to the current graphics, images, audio, video and other digital multimedia forms. With the development of a large number of multimedia applications, the digital image is easy to be operated and tampered, this paper aims to study an image fingerprint algorithm based on the masking characteristics of the human eye. An image sensing Hash algorithm based on human visual model is proposed to effectively eliminate the influence of geometric attacks. Watson visual model is used to deal with the DCT coefficients to produce the image fingerprint sequences, which has excellent robustness and security. The experiment proves that the algorithm can certify the copyright of the image, reduce geometric attacks, JPEG compression and other attacks, it can also use the key to generate the pseudo-random matrix, so as to encrypt the image, and effectively realize the security of the algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Shuihua, H., Chu, C.H.: Content-based image authentication: current status, issues, and challenges. Int. J. Inf. Secur. 9(2), 19–32 (2010)

    Google Scholar 

  2. Kalker, T., Haitsma, J., Oostveen, J.C.: Issues with digital water-marking and perceptual hashing. In: Multimedia System Application IV. Denver, Co, USA, vol. 4518, pp. 189–197 (2001)

    Google Scholar 

  3. Xiamu, N., Yuhua, J.: Perception of Hashi. Electron. J. 36(7), 1405–1411 (2008)

    Google Scholar 

  4. Arnia, F., Munadi, K., Fujiyoshi, M., et al.: Efficient content-based copy detection using signs of DCT coefficient. In: IEEE Symposium on Industrial Electronics and Applications (IEIEA). Kuala Lumpur, Malaysia, vol. 1, pp. 494–499 (2009)

    Google Scholar 

  5. Liu, F., Wang, H., Cheng, L.M., et al.: Enhanced perceptual image authentication with tamper localization and self-restoration. In: IEEE International Conference on Multimedia and Expo (ICME). California, USA, vol. 7, pp. 1–6 (2014)

    Google Scholar 

  6. Prungsinchai, S.: Fourier-Mellin transform for robust image hashing. In: Fourth International Conference on Emerging Security Technology (EST), Cambridge, UK, vol. 40, pp. 58–61 (2013)

    Google Scholar 

  7. Tang, Z., Wang, S., Zhang, X., et al.: Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools and Applications. 52(4), 325–345 (2011)

    Article  Google Scholar 

  8. Qin, C., Wang, S., Zhang, X.: An image picking method based on visual characteristics. Chin. J. Image Graph. 11(11), 1678–1681 (2006)

    Google Scholar 

  9. Hui, Z., Qiong, L.: Hashi algorithm for image sensing based on human visual system. Electron. J. 6(12A), 30–34 (2008)

    MathSciNet  Google Scholar 

  10. Hu, Y.: Research on image sensing Hashi algorithm based on visual model, vol. 15, pp. 69–75. Harbin Industrial University, Harbin (2011)

    Google Scholar 

  11. Hu, D., Hu P., Zhang, H.: A perceptual hashing algorithm based on adjustable visual threshold. In: International Conference on Intelligent System Design and Engineering Application, Changsha, China, vol. 15, pp. 133–136 (2010)

    Google Scholar 

  12. Ghouti, L.: Robust perceptual color image hashing using quaternion singular value decomposition. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, vol. 12, pp. 3794–3798 (2014)

    Google Scholar 

  13. Watson, A.B.: DCT quantization matrics visually optimized for individual images. In: Human Vision, Visual Processing, and Digital Display IV. California, USA, vol. 8, pp. 202–216 (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhang Chi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Chi, Z. (2018). Research on Image Fingerprint Technology Based on Watson Visual Model Multimedia Technology. In: Mizera-Pietraszko, J., Pichappan, P. (eds) Lecture Notes in Real-Time Intelligent Systems. RTIS 2016. Advances in Intelligent Systems and Computing, vol 613. Springer, Cham. https://doi.org/10.1007/978-3-319-60744-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60744-3_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60743-6

  • Online ISBN: 978-3-319-60744-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics