Robust Image Fingerprinting via Distortion-Resistant Sparse Coding | IEEE Journals & Magazine | IEEE Xplore

Robust Image Fingerprinting via Distortion-Resistant Sparse Coding


Abstract:

Content fingerprinting recently emerges as an effective nonintrusive solution for copyright protection. Fingerprinting algorithm maps the perceptual contents of media fil...Show More

Abstract:

Content fingerprinting recently emerges as an effective nonintrusive solution for copyright protection. Fingerprinting algorithm maps the perceptual contents of media file to an invariant digest, so that unauthorized copies can be identified via fingerprint comparison. This letter presents a distortion-resistant sparse coding strategy for image fingerprinting that simulates the hierarchical information processing flow of visual system. Sparse coding, which seeks a small set of atoms that can best represent input signal, helps fingerprinting algorithm detect the intrinsic visual features of image. However, the high freedom of atom selection makes sparse coding sensitive to distortion. In this letter, several measures are applied on sparse coding and dictionary learning to jointly ensure the invariance of fingerprint, such as imposing the neighborhood-priority principle on atom selection, regulating the layout of atoms, and forcing sparse codes to preserve the distance in the image space. Content identification performance of the proposed work was tested on a database of 219 000 images. The error rate of the proposed algorithm is at least ten times lower than state-of-the-arts, and satisfactory performance was observed even under extremely low bit budget.
Published in: IEEE Signal Processing Letters ( Volume: 25, Issue: 1, January 2018)
Page(s): 140 - 144
Date of Publication: 27 November 2017

ISSN Information:

Funding Agency:

References is not available for this document.

I. Introduction

The emergence of social network makes content sharing unprecedentedly easy, while the problem of copyright infringement is also aggravated. A traditional technique for tackling this problem is digital watermarking. However, digital watermarking protects copyright at the price of degrading the perceptual quality of cover media. More importantly, it is not able to resolve the copyright dispute on the content where no watermark was embedded in advance. The robustness against distortion is another bottleneck in real applications. A media file may experience a bunch of distortions and transformations during its life-cycle, which significantly increases the difficulty of watermark detection. Content fingerprinting is a successful alternative to digital watermarking. Content fingerprinting summarizes the intrinsic perceptual characteristics of digital media into a short and invariant ID, such as human fingerprint, and the perceptual equality between media files can be determined by comparing their fingerprints. As a result, content fingerprinting has been widely adopted by social networks to filter the uploads that may cause copyright violation. Being a low-cost solution for content identification, content fingerprinting has also found applications in indexing, broadcast monitoring, recommendation, etc.

Select All
1.
J. C. Oostveen, T. Kalker, and J. Haitsma, “Feature extraction and a database strategy for video fingerprinting,” in Proc. Recent Adv. Vis. Inf. Syst., Apr. 2002, pp.  117–128.
2.
Z. Tang, X. Zhang, X. Li, and S. Zhang, “Robust image hashing with ring partition and invariant vector distance,” IEEE Trans. Inf. Forensics Security, vol.  11, no.  1, pp.  200–214, Jan. 2016.
3.
Y. Lei, W. Luo, Y. Wang, and J. Huang, “Video sequence matching based on the invariance of color correlation,” IEEE Trans. Circuits Syst. Video Technol, vol.  22, no.  9, pp.  1332–1343, Sep. 2012.
4.
Y. Li, “Robust content fingerprinting algorithm based on sparse coding,” IEEE Signal Process. Lett., vol.  22, no.  9, pp.  1254–1258, Sep. 2015.
5.
M. M. Esmaeili, M. Fatourechi, and R. K. Ward, “A robust and fast video copy detection system using content-based fingerprinting,” IEEE Trans. Inf. Forensics Security, vol.  6, no.  1, pp.  213–226, Mar. 2011.
6.
A. Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Inf. Forensics Security, vol.  1, no.  2, pp.  215–230, Jun. 2006.
7.
Z. Tang, F. Yang, L. Huang, and M. Wei, “DCT and DWT based image hashing for copy detection,” ICIC Express Lett., vol.  7, no.  11, pp.  2961–2967, Nov. 2013.
8.
J. S. Seo, J. Haitsma, T. Kalker, and C. D. Yoo, “A robust image fingerprinting system using the Radon transform,” Signal Process. Image Commun., vol.  19, no.  4, pp.  325–339, Apr. 2004.
9.
Y. Li, P. Wang, and Y. Su, “Robust image hashing based on selective quaternion invariance,” IEEE Signal Process. Lett., vol.  22, no.  12, pp.  2396–2400, Dec. 2015.
10.
X. Lv and Z. J. Wang, “Perceptual image hashing based on shape contexts and local feature points,” IEEE Trans. Inf. Forensics Security, vol.  7, no.  3, pp.  1081–1093, Jun. 2012.
11.
V. Monga and M. K. Mıhçak, “Robust and secure image hashing via non-negative matrix factorizations,” IEEE Trans. Inf. Forensics Security, vol.  2, no.  3, pp.  376–390, Sep. 2007.
12.
Z. Tang, X. Zhang, and S. Zhang, “Robust perceptual image hashing based on ring partition and NMF,” IEEE Trans. Knowl. Data Eng., vol.  26, no.  3, pp.  711–724, Mar. 2014.
13.
M. Li and V. Monga, “Robust video hashing via multilinear subspace projections,” IEEE Trans. Image Process., vol.  21, no.  10, pp.  4397–4409, Oct. 2012.
14.
X. Nie, Y. Yin, J. Sun, J. Liu, and C. Cui, “Comprehensive feature-based robust video fingerprinting using tensor model,” IEEE Trans. Multimedia, vol.  19, no.  4, pp.  785–796, Apr. 2017.
15.
Z. Tang, Z. Huang, X. Zhang, and H. Luo, “Robust image hashing with multidimensional scaling,” Signal Process., vol.  137, pp.  240–250, Aug. 2017.
16.
M. Li and V. Monga, “Compact video fingerprinting via structural graphical models,” IEEE Trans. Inf. Forensics Security, vol.  8, no.  11, pp.  1709–1721, Nov. 2013.
17.
Z. Tang, H. Lao, X. Zhang, and K. Liu, “Robust image hashing via DCT and LLE,” Comput. Security, vol.  62, pp.  133–148, Sep. 2016.
18.
B. Wu, S. S. Krishnan, N. Zhang, and L. Su, “Compact and robust video fingerprinting using sparse represented features,” in Proc. IEEE Int. Conf. Multimedia Expo, Aug. 2016, pp.  1–6.
19.
F. Zou, Y. Chen, J. Song, K. Zhou, Y. Yang, and N. Sebe, “Compact image fingerprint via multiple kernel hashing,” IEEE Trans. Multimedia, vol.  17, no.  7, pp.  1006–1018, Jul. 2015.
20.
Z. Tang, S. Wang, X. Zhang X, and Y. Zhao, “Lexicographical framework for image hashing with implementation based on DCT and NMF,” Multimedia Tool. Appl., vol.  52, pp.  325–345, Apr. 2011.
21.
J. Wang, J. Yang, K. Yu, F. Lv, T. Huang, and Y. Gong, “Locality-constrained linear coding for image classification,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., June 2010, pp.  3360–3367.
22.
M. Aharon, M. Elad, and A. Bruckstein, “K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation,” IEEE Trans. Signal Process., vol.  54, no.  11, pp.  4311–4322, Nov. 2006.
23.
Y. C. Pati, R. Rezaiifar, and P. S. Krishnaprasad, “Orthogonal matching pursuit: Recursive function approximation with applications to wavelet decomposition,” in Proc. Conf. Signal, Syst. Comput., Nov. 1993, vol.  1, pp.  40–44.
24.
T. Tijmen, “Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude,” 2014. [Online]. Avaliable: http://www.cs.toronto.edu/˜tijmen/csc321/lecture_notes.shtml
25.
J. Deng, W. Dong, R. Socher, L. J. Li, K. Li, and F. F. Li, “ImageNet: A large-scale hierarchical image database,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2009, pp.  248–255.
26.
Y. Li, Z. Lu, C. Zhu, and X. Niu, “Robust image hashing based on random Gabor filtering and dithered lattice vector quantization,” IEEE Trans. Image Process., vol.  21, no.  4, pp.  1963–1980, Apr. 2012.
27.
L. W. Kang, C. S. Lu, and C. Y. Hsu, “Compressive sensing-based image hashing,” in Proc. IEEE Int. Conf. Image Process., Nov. 2009, pp.  1285–1288.
28.
A. L. Varna and M. Wu, “Modeling and analysis of correlated binary fingerprints for content identification,” IEEE Trans. Inf. Forensics Security, vol.  6, no.  3, pp.  1146–1159, Sep. 2011.

Contact IEEE to Subscribe

References

References is not available for this document.