Robust Perceptual Image Hashing via Matrix Invariants (WP-P7)
Author(s) :
Suleyman S. Kozat (University of Illinois, Urbana-Champaign, USA)
Ramarathnam Venkatesan (Microsoft Research, USA)
M. Kivanc Mihcak (Microsoft Research, USA)
Abstract : In this paper we suggest viewing images (as well as attacks on them) as a sequence of linear operators and propose novel hashing algorithms employing transforms that are based on matrix invariants. To derive this sequence, we simply cover a two dimensional representation of an image by a sequence of (possibly overlapping) rectangles $R_i$ whose sizes and locations are chosen randomly from a suitable distribution. Our algorithm will use a cryptographically secure random generator for the random choices it makes, so all our random choices are in fact pseudo-random. The restriction of the image (representation) to each $R_i$ gives rise to a matrix $A_i$. The fact that $A_i$'s will overlap and are random, makes the {\em sequence} (respectively) a redundant and non-standard representation of images, but is crucial for our purposes. Our algorithms first construct a {\em secondary image}, derived from input image by pseudo-randomly extracting features that approximately capture semi-global geometric characteristics. From the {secondary image} (which does not perceptually resemble the input), we further extract the final features which can be used as a hash value (and can be further suitably quantized). In this paper, we use spectral matrix invariants as embodied by Singular Value Decomposition. Surprisingly, formation of the secondary image turns out be quite important since it not only introduces further robustness (i.e, resistance against standard signal processing transformations), but also enhances the security properties (i.e. resistance against intentional attacks). Indeed, our experiments reveal that our hashing algorithms extract most of the geometric information from the images and hence are robust to severe perturbations (e.g. up to 50% cropping by area with 20 degree rotations) on images while avoiding misclassification. Our methods are general enough to yield a watermark embedding scheme, which we study in another paper.

Menu