Skip to main content

Image Distortion Estimation by Hash Comparison

  • Conference paper
Advances in Multimedia Modeling (MMM 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6523))

Included in the following conference series:

Abstract

Perceptual hashing is conventionally used for content identification and authentication. In this work, we explore a new application of image hashing techniques. By comparing the hash values of original images and their compressed versions, we are able to estimate the distortion level. A particular image hash algorithm is proposed for this application. The distortion level is measured by the signal to noise ratio (SNR). It is estimated from the bit error rate (BER) of hash values. The estimation performance is evaluated by experiments. The JPEG, JPEG2000 compression, and additive white Gaussian noise are considered. We show that a theoretical model does not work well in practice. In order to improve estimation accuracy, we introduce a correction term in the theoretical model. We find that the correction term is highly correlated to the BER and the uncorrected SNR. Therefore it can be predicted using a linear model. A new estimation procedure is defined accordingly. New experiment results are much improved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proc. of International Conference on Image Processing (ICIP 1996), vol. 3, pp. 227–230 (1996)

    Google Scholar 

  2. Fridrich, J.: Robust bit extraction from images. In: Proc. of IEEE International Conference on Multimedia Computing and Systems, vol. 2, pp. 536–540 (1999)

    Google Scholar 

  3. Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1(2), 215–230 (2006)

    Article  Google Scholar 

  4. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons, Chichester (1996)

    MATH  Google Scholar 

  5. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  MATH  Google Scholar 

  6. Roy, S., Sun, Q.: Robust hash for detecting and localizing image tampering. In: Proc. of International Conference on Image Processing, vol. 6, pp. 117–120 (2007)

    Google Scholar 

  7. Tagliasacchi, M., Valenzise, G., Tubaro, S.: Hash-based identification of sparse image tampering. IEEE Transactions on Image Processing 18(11), 2491–2504 (2009)

    Article  MathSciNet  Google Scholar 

  8. Lu, W., Varna, A., Wu, M.: Forensic hash for multimedia information. In: Proc. of SPIE Media Forensics and Security Conference (2010)

    Google Scholar 

  9. Doets, P.J.O., Lagendijk, R.L.: Distortion estimation in compressed music using only audio fingerprints. IEEE Transactions on Information Forensics and Security 16(2), 302–317 (2008)

    Google Scholar 

  10. Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing 13(4), 600–612 (2004)

    Article  Google Scholar 

  11. Brooks, A., Pappas, T.: Using structural similarity quality metrics to evaluate image compression techniques. In: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2007, April 15-20, vol. 1, pp. I-873–I-876 (2007)

    Google Scholar 

  12. Haitsma, J., Kalker, T.: A highly robust audio fingerprinting system. In: Proc. of 3rd International Conference on Music Information Retrieval, pp. 107–115 (October 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weng, L., Preneel, B. (2011). Image Distortion Estimation by Hash Comparison. In: Lee, KT., Tsai, WH., Liao, HY.M., Chen, T., Hsieh, JW., Tseng, CC. (eds) Advances in Multimedia Modeling. MMM 2011. Lecture Notes in Computer Science, vol 6523. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17832-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17832-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17831-3

  • Online ISBN: 978-3-642-17832-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics