15
Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei S un, and Pao-Chi Chang Proc. IEEE Int. Conf. on Multimedia and Expo: special s ession on Media Identification, Taipei, Taiwan, 2 004 Reporter: Jen-Bang Feng

Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

Embed Size (px)

Citation preview

Page 1: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

Robust Mesh-based Hashing for Copy Detection and Tracing of Images

Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang

Proc. IEEE Int. Conf. on Multimedia and Expo: special session on Media Identification, Taipei, Taiwan, 2004

Reporter: Jen-Bang Feng

Page 2: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

2

Outline

Watermarking and Hashing The Proposed Method Conclusions

Page 3: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

3

Watermarking and Hashing Digital Watermarking (Data Hiding)

Content has to be modified (a data hiding technique) Contents to be protected must be watermarked Measures “originality” Stand-along

Media Hashing (Fingerprinting) Content is not modified (a non-hiding technique) Can track the usage of contents already available in

the public domain Measure “similarity” Connection to database required

Page 4: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

4

Robust Signal Hashing Problem

Hash(Baboon)= XXX…

Hash(Lena)= YYY…

Hash(Lena 2)= ZZZ…

Should be very different

Should be sufficiently similar

Page 5: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

5

Perceptual Hashing The fragility of cryptography

hashing is too restricted Media data permits acceptable

distortions Media hashing needs

Robustness (error-resilience) Collision-free Fast searching (complexity) Scalability

Page 6: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

6

Track 1Track 1

Architecture for Robust Identification of Media Content

Track

Track 1Track 1Meta data

FingerprintGenerator

Database

CompareFingerprintGenerator

Test Track

If matchReturn Track ID Confidence

Page 7: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

7

The Proposed Method

DWTOriginalimage

Harrisdetector

Delaunaytesslation

Meshnormalization

Mesh-basedHash extraction

Lowest-frequencycomponent

Mesh generation

Normalizedmeshes

Hash sequence

Page 8: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

8

The Proposed Method

Page 9: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

9

Mesh Normalization

A

B

C

Mk

A’ B’

C’

Mknorm

Page 10: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

10

Mesh-Based Hashing

32

32

4x4 DCTTotal 64 blocks

otherwise.,0

ones,larger theis 1 if,1 sk

k

ACsH

64 bits per mesh, half 1’s and half 0’s

Page 11: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

11

Conclusions

The number of 0’s and 1’s are the same

Collision-free Robust against attacks

Page 12: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

12

Watermark AttacksWatermarking Attacks

RemovalAttack

GeometricalAttack

CryptographicAttack

ProtocolAttack

DenoisingLossy compressionQuantizationRemodulation Collusion Averaging

Global, local warpingGlobal, local transformsJittering

Brute force key searchOracle

Watermark inversionCopy attack

Voloshynovskiy et al. “attacks modeling: towards a second generation watermarking benchmark,” Signal Processing, 2001Kutter and Petitcolas, “A fair benchmark for image watermarking systems,” Proc. SPIE99

Page 13: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

13

Harris Detector

where I(x, y) is the grey level intensity and where A represents the integration of A on a given neighborhood. If at a certain point the two eigenvalues of the matrix are large, then a small motion in any direction will cause an important change of grey level. This indicates that the point is a corner.

2

2

,

yI

yI

xI

yI

xI

xI

M

Page 14: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

14

Harris Detector The corner response function is given

by:

where k is a parameter set to 0.04 (a suggestion of Harris). Corners are defined as local maxima of the cornerness function. Sub-pixel precision is achieved through a quadratic approximation of the neighborhood of the local maxima.

2det MtrkMR

Page 15: Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf

15

Delaunay Triangulation Voronoi Diagrams

每一點皆屬於最靠近的一區 http://infoshako.sk.tsukuba.ac.jp/~to

hyama/voro/edelacli.html