2023
DOI: 10.1109/tkde.2021.3131188
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Hashing Method Using 2D-2D PCA for Image Copy Detection

Abstract: Image copy detection is an important technology of copyright protection. This paper proposes an efficient hashing method for image copy detection using 2D-2D (two-directional two-dimensional) PCA (Principal Component Analysis). The key is the discovery of the translation invariance of 2D-2D PCA. With the property of translation invariance, a novel model of extracting rotation-invariant lowdimensional features is designed by combining PCT (Polar Coordinate Transformation) and 2D-2D PCA. The PCT can convert an i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1
1

Relationship

3
7

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 64 publications
(92 reference statements)
0
14
0
Order By: Relevance
“…Therefore, they are extremely sensitive to data bit changes, i.e., changing only 1 bit of the data will significantly change the output. Different from cryptographic hashing, perceptual hashing [1,12,21,28,35,44,46,47] can verify the integrity of the data when the data is modified in a content-preserving way. With perceptual hashing, the hash codes of the original image and the modified image are still similar if images are modified by image operators such as image filtering, JPEG compression, or image resize.…”
Section: Image Hashingmentioning
confidence: 99%
“…Therefore, they are extremely sensitive to data bit changes, i.e., changing only 1 bit of the data will significantly change the output. Different from cryptographic hashing, perceptual hashing [1,12,21,28,35,44,46,47] can verify the integrity of the data when the data is modified in a content-preserving way. With perceptual hashing, the hash codes of the original image and the modified image are still similar if images are modified by image operators such as image filtering, JPEG compression, or image resize.…”
Section: Image Hashingmentioning
confidence: 99%
“…Therefore, they are extremely sensitive to data bit changes, i.e., changing only 1 bit of the data will significantly change the output. Different from cryptographic hashing, perceptual hashing [1,12,21,28,35,44,46,47] can verify the integrity of the data when the data is modified in a content-preserving way. With perceptual hashing, the hash codes of the original image and the modified image are still similar if images are modified by image operators such as image filtering, JPEG compression, or image resize.…”
Section: Image Hashingmentioning
confidence: 99%
“…[3][4][5] In recent years, some researchers have proposed using hashing schemes 6,7 to detect copy versions of multimedia data for copyright protection. [8][9][10] Video hashing is an effective technique for video data processing. 11,12 In practical applications, the use of a hash for representing the video itself can reduce storage cost and speed up similarity computation.…”
Section: Introductionmentioning
confidence: 99%