期刊文献+

面向感知哈希的图像数据集

Large-scale image dataset for perceptual hashing
原文传递
导出
摘要 目的 感知图像哈希又称图像摘要或是图像指纹,是一种有效的图像认证技术,近年来受到了广泛的关注。该技术通过将图像的感知鲁棒特征转化为固定长度的哈希序列,来实现图像版权认证。然而,该领域始终缺乏一个比较通用的数据集,已有数据集所使用的图像内容保留操作和真实场景差异较大,使得训练得到的神经网络架构在应对复杂的图像编辑操作时效果显著下降。方法 针对感知图像哈希任务,面向实际图像内容认证场景构建了一个新的数据集。首先,将现实中常见的图像内容保留操作进行总结和分类,设计了48种单一、复合的图像内容保留操作来生成感知相似图像;然后,根据感知图像哈希的定义,选择与待认证图像语义相似但是感知内容不同的图像作为感知不相似图像,增加了该数据集的辨别难度;最终建立了一个包含116 400幅图像的感知哈希图像数据集。结果 由于本文提出的数据集使用的图像内容保留操作更加复杂,不相似图像也更加难以辨别,使得在该数据集上训练得到的深度神经网络具有较好的泛化能力,即这些神经网络即使不进行重新训练或是微调,也可以在其他数据集上取得较好的认证性能。同时,在该数据集上训练得到的神经网络在不同数据集上性能差别较小,体现了本文数据集具有较好的稳定性。结论 设计了一个针对感知哈希的图像数据集,大量的对比实验表明了该数据集的有效性,该工作可对感知图像哈希领域的发展起到促进作用。 Objective With the rapid development of social media,multimedia information on the internet is updated at anexponential rate.Obtaining and transmitting digital images have become convenient,considerably increasing the risk ofmalicious tampering and forgery of images.Accordingly,increasing attention is given to image authentication and contentprotection.Many image authentication schemes have emerged recently,such as watermarking,the use of digital signa⁃tures,and perceptual image hashing(PIH).PIH,also known as image abstract or image fingerprint,is an effective tech⁃nique for image authentication that has attracted widespread research attention in recent years.The goal of PIH is to authen⁃ticate an image by compressing perceptual robust features into a compact hash sequence with a fixed length.However,ageneral dataset in this field is lacking,and the dataset constructed using other methods have many problems.On the one hand,the types of image content-preserving manipulations used in these datasets are few and the intensity of attacks is rela⁃tively weak.On the other hand,the distinct images used in these datasets are extremely different from the images that mustbe authenticated,making it easy to distinguish them from each other.The convolutional neural networks(CNNs)trainedby these datasets have poor generalizability and can hardly cope with the complex and diverse image editing operations inreality.This important factor has limited the development of the PIH field.Method On the basis of the preceding knowl⁃edge,we propose a specialized dataset based on various manipulations in this study.This dataset can deal with compleximage authentication scenarios.The proposed dataset is divided into three subsets:original,perceptual identical,and per⁃ceptual distinct images.The latter two correspond to the robustness and discrimination of PIH,respectively.Originalimages are selected from ImageNet1K,and each of them corresponds to one category.For identical images,we summarizethe content-preserving manipulations commonly used in the field of PIH and group them into four major categories:geomet⁃ric,enhancement,filter,and editing manipulations.Each major category is subdivided into different types,for a total of35 single-image content-preserving manipulations.To ensure the diversity and reflect the randomness of image editing inreality,we set a threshold for each type of image content-preserving manipulation and let them randomly select the attackintensity within this range.In addition,we randomly combine multiple single-image content-preserving manipulations toform combination manipulations.Some combined manipulations in the test set have not been learned in the training set dueto the randomness.This result is also in line with practical application scenarios,because many unlearned,combinedimage editing manipulations exist in reality.For perceptual distinct images,except for a portion of images unrelated to theoriginal images,the other portions are selected from the same category that corresponds to each original image,increasingthe difficulty of the dataset and improving the generalizability of the trained CNNs.Compared with previously adopted data⁃sets,our dataset conforms more to the actual application scenario of the PIH task.Our dataset contains 1200 originalimages,and each original image is subjected to 48 image content-preserving manipulations to generate 48 perceptual identi⁃cal images.To balance the number of perceptual identical and distinct images,we also select 48 perceptual distinct imagesfor each original image.Then,24 images are randomly selected among them,and the other 24 images are semanticallysimilar to the original images.Therefore,each batch contains 1 original image,48 perceptual identical images,and 48perceptual distinct images,for a total of 97 images.Our dataset has 1200 original images or 116400 images in total.Thelarge amount of data ensures the effective training of CNNs.Result To validate the performance of the dataset proposed inthis study(i.e.,PIHD),four CNNs were trained on five datasets,including PIHD,and tested on these datasets.Thereceiver operating characteristic curves of each model is compared to judge its performance.The content-preservingmanipulations used in this dataset are more complex and distinct images are more difficult to distinguish,the CNNs trainedon this dataset provide better image authentication performance.Even without retraining or fine-tuning,they can stillobtain satisfactory image authentication performance on other datasets,fully demonstrating the generalizability of the PIHDdataset.In addition,we compare the area under curve of each model on different test sets.The results demonstrate that theperformance of the networks trained on other comparison datasets varies considerably across test sets,while the perfor⁃mance trained on PIHD remains nearly constant across datasets,reflecting the stability of the PIHD dataset.Collectively,the networks trained on our dataset are stable and exhibit certain generalization ability,enabling them to cope with complexand diverse real-world editing operations.Conclusion In this study,we design a dataset for the PIH task that uses richerimage content-preserving manipulations and exhibits a certain randomness to restore the real application scenario to themaximum extent.In addition,images with the same semantic meaning as the original images are added to the distinctimages in the dataset,increasing the difficulty in compliance with the PIH task.This step enables the trained CNNs to copewith more realistic and complex practical application scenarios.We test the dataset with different models on various data⁃sets,including our proposed dataset.A large number of experiments demonstrate the effectiveness,generalizability,andstability of this dataset.Hence,this dataset can promote the development of the PIH field.
作者 周元鼎 房耀东 秦川 Zhou Yuanding;Fang Yaodong;Qin Chuan(School of Optical-Electrical and Computer Engineering,University of Shanghai for Science and Technology,Shanghai 200093,China)
出处 《中国图象图形学报》 CSCD 北大核心 2024年第2期343-354,共12页 Journal of Image and Graphics
基金 国家自然科学基金项目(62172280,U20B2051) 上海市自然科学基金项目(21ZR1444600)。
关键词 感知图像哈希 图像认证 数据增强 数据集 内容保留操作 perceptual image hashing image authentication data augmentation dataset content-preserving manipulation
  • 相关文献

参考文献3

二级参考文献16

  • 1Oestveen J, Kalker T, Haitsma J. Visual Hashing of digital video: applications and techniques [ J ]. SPIE Applications of Digital Image Processing XXIV, SPIE Press, 2001,4472: 121-131.
  • 2Zhou X, Schmucker M, Brown C L. Perceptual Hashing of video content based on differential block similarity [ C ]// Proceedings of 2005 International Conference on Computational Intel-ligence and Security. Xi'an: Xidian University Press, 2005: 3802.
  • 3Venkatesan R, Koon S M, Jakubowski M H. Robust image Hashing [ C ]//Proceedings of IEEE International Conference on Image Processing (ICIP). Vancouver: IEEE Press,2000, (3) : 664-666.
  • 4Coskun B, Sankur B, Memon N. Spatio-temporal transform based video Hashing [ J ]. IEEE Transactions on Multimedia, 2006,8(6) :1190-1208.
  • 5Watson A B. The Cortex transform: rapid computation of simulated neural images [ J ]. Computer Vision Graphics and Image Processing, 1986, 39 ( 1 ) : 311-327.
  • 6Kelly D H. Motion and vision: II. stabilized spatio-temporal threshold surface[J]. Journal of the Optical Society of America A, 1979, 69(3) :1340-1349.
  • 7Daly S. Engineering observations from spatiovelocity and spatiotemporal visual models E C ]// Processing SHE. San Jose, CA, USA: SPIE Press, 1998:180-191.
  • 8Wei Zhenyu, King N N. Spatio-temporal just noticeable distortions profile for grey scale image/video in DCT domain[ J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009, 19(3) :337-346.
  • 9Zhu Guopu, Huang Juwu, Kwong Sam, et al. Fragility analysis of adaptive quantization-based image Hashing [ J ]. IEEE Transactions on Information Forensics and Security, 2010, 5 ( 1 ) : 133-144.
  • 10牛夏牧,焦玉华.感知哈希综述[J].电子学报,2008,36(7):1405-1411. 被引量:97

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部