{"title":"The analysis of an NMF-based perceptual image hashing scheme","authors":"S. A. H. Tabatabaei, C. Ruland","doi":"10.1109/ISSPIT.2013.6781863","DOIUrl":null,"url":null,"abstract":"This paper analyzes a recently introduced perceptual image hashing scheme. This scheme uses non-negative matrix factorization (NMF) as the feature of the image on the secondary image obtained by the ring partitioning of the original one. The image hash is rotation-invariant with arbitrary degree but it is robust against acceptable content-preserving image modifications. We re-visit the algorithm and show that the algorithm tolerates some serious security flaws. Ignoring specific areas of the image in the feature extraction stage and invariance against individual ring rotation are two existing drawbacks. Practical experiments show the mentioned weaknesses and some solutions will be proposed.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"14 1","pages":"000108-000112"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSPIT.2013.6781863","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper analyzes a recently introduced perceptual image hashing scheme. This scheme uses non-negative matrix factorization (NMF) as the feature of the image on the secondary image obtained by the ring partitioning of the original one. The image hash is rotation-invariant with arbitrary degree but it is robust against acceptable content-preserving image modifications. We re-visit the algorithm and show that the algorithm tolerates some serious security flaws. Ignoring specific areas of the image in the feature extraction stage and invariance against individual ring rotation are two existing drawbacks. Practical experiments show the mentioned weaknesses and some solutions will be proposed.