• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhou Yuanding, Gao Guopeng, Fang Yaodong, Qin Chuan. Perceptual Authentication Hashing with Image Feature Fusion Based on Window Self-Attention[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330669
Citation: Zhou Yuanding, Gao Guopeng, Fang Yaodong, Qin Chuan. Perceptual Authentication Hashing with Image Feature Fusion Based on Window Self-Attention[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330669

Perceptual Authentication Hashing with Image Feature Fusion Based on Window Self-Attention

More Information
  • Author Bio:

    Zhou Yuanding: born in 1997. PhD. His main research interests include deep perceptual hashing and multimedia information processing

    Gao Guopeng: born in 1998. Master. His main research interest includes perceptual image hashing

    Fang Yaodong: born in 1997. Master. His main research interests include perceptual image hashing and image authentication

    Qin Chuan: born in 1980. PhD, professor, PhD supervisor, Senior member of CCF. His main research interests include multimedia information security and AI security

  • Received Date: August 20, 2023
  • Accepted Date: January 25, 2025
  • Available Online: January 25, 2025
  • With the rapid development of multimedia and network technology, the security of digital image content is becoming more and more prominent. In this paper, we propose a deep perceptual image authentication hashing schema based on window self-attention feature fusion, that can effectively detect whether the perceptual content of the original image has changed. It can be applied to content authentication, tampering recognition, copy detection, and other similar scenarios. This model uses a convolutional neural network architecture that integrates a window self-attention mechanism to build a hashing model that encompasses global and local image features. The model chunks the shallow features obtained from the backbone network and extracts the corresponding window features, then calculates the correlation between each intermediate local feature and the global feature to filter out the final local features, and finally inputs the local features and global features into the hash generation module for fusion and compression to obtain the final image hash code. In the training process, an integrated loss function based on hash loss and classification loss is used to constrain the model to improve the robustness and discrimination. The experimental results show that this scheme can achieve superior image content authentication performance compared with existing typical perceptual authentication hashing schemes.

  • [1]
    Yan Caiping, Pun Chiman, Yuan Xiaochen. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection[J]. Signal Processing, 2016, 121(C): 1−16
    [2]
    Su Qingtang, Liu Decheng, Sun Yehan. A robust adaptive blind color image watermarking for resisting geometric attacks[J]. Information Sciences: An International Journal, 2022, 606: 194−212 doi: 10.1016/j.ins.2022.05.046
    [3]
    朱新山,陈砚鸣,董宏辉,等. 基于双域信息融合的鲁棒二值文本图像水印[J]. 计算机学报,2014,37(6):1352−1364

    Zhu Xinshan, Chen Yanming, Dong Honghui, et al. Robust double domain watermarking for binary document image[J]. Chinese Journal of Computers, 2014, 37(6): 1352−1364(in Chinese)
    [4]
    Liao Xin, Li Kaide, Zhu Xinshan, et al. Robust detection of image operator chain with two-stream convolutional neural network[J]. IEEE Journal of Selected Topics in Signal Processing, 2020, 14(5): 955−968 doi: 10.1109/JSTSP.2020.3002391
    [5]
    彭安杰,康显桂. 基于滤波残差多方向差分的中值滤波取证技术[J]. 计算机学报,2016,39(3):503−515 doi: 10.11897/SP.J.1016.2016.00503�

    Peng Anjie, Kang Xiangui. Median filtering forensics based on multi-directional difference of filtering residuals[J]. Chinese Journal of Computers, 2016, 39(3): 503−515(in Chinese) doi: 10.11897/SP.J.1016.2016.00503�
    [6]
    Shen Qi, Zhao Yan. Perceptual hashing for color image based on color opponent component and quadtree structure[J]. Signal Processing, 2020, 166: 107244 doi: 10.1016/j.sigpro.2019.107244
    [7]
    Zhang Qiuyu, Han Jitian. A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding[J]. Multimedia Tools and Applications, 2021, 80(9): 13841−13864 doi: 10.1007/s11042-020-10437-z
    [8]
    秦川,郭梦琦,李欣然,等. 一种加密域鲁棒图像哈希算法[J]. 软件学报,2023,34(2):868−883

    Qin Chuan, Guo Mengqi, Li Xinran, et al. Robust image hashing in encrypted domain[J]. Journal of Software, 2023, 34(2): 868−883(in Chinese)
    [9]
    Huang Ziqing, Liu Shiguang. Perceptual image hashing with texture and invariant vector distance for copy detection[J]. IEEE Transactions on Multimedia, 2020, 23: 1516−1529
    [10]
    Huang Ziqing, Tang Zhenjun, Zhang Xianquan, et al. Perceptual image hashing with locality preserving projection for copy detection[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(1): 463−477 doi: 10.1109/TDSC.2021.3136163
    [11]
    Du Ling, Ho A T S, Cong Runmin. Perceptual hashing for image authentication: A survey[J]. Signal Processing: Image Communication, 2020, 81: 115713 doi: 10.1016/j.image.2019.115713
    [12]
    Li Xinran, Qin Chuan, Wang Zichi, et al. Unified performance evaluation method for perceptual image hashing[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 1404−1419 doi: 10.1109/TIFS.2022.3161149
    [13]
    Li Xiaoqing, Yang Jiansheng, Ma Jinwen. Recent developments of content-based image retrieval (CBIR)[J]. Neurocomputing, 2021, 452: 675−689 doi: 10.1016/j.neucom.2020.07.139
    [14]
    Ouyang Junlin, Liu Yizhi, Shu Huazhong. Robust hashing for image authentication using SIFT feature and quaternion Zernike moments[J]. Multimedia Tools and Applications, 2017, 76(2): 2609−2626 doi: 10.1007/s11042-015-3225-x
    [15]
    Singh S P, Bhatnagar G, Singh A K. A new robust reference image hashing system[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(4): 2211−2225 doi: 10.1109/TDSC.2021.3050435
    [16]
    Srivastava M, Siddiqui J, Ali M A. Robust image hashing based on statistical features for copy detection[C]//Proc of the IEEE Uttar Pradesh Section Int Conf on Electrical, Computer and Electronics Engineering (UPCON’16). Piscataway, NJ: IEEE 2016: 490−495
    [17]
    Qin Chuan, Chang C C, Tsou P L. Robust image hashing using non-uniform sampling in discrete Fourier domain[J]. Digital Signal Processing, 2013, 23(2): 578−585 doi: 10.1016/j.dsp.2012.11.002
    [18]
    Abdullahi S M, Wang Hongxia, Li Tao. Fractal coding-based robust and alignment-free fingerprint image hashing[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 2587−2601 doi: 10.1109/TIFS.2020.2971142
    [19]
    Li Yuenan, Wang Dongdong, Tang Linlin. Robust and secure image fingerprinting learned by neural network[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 30(2): 362−375
    [20]
    Qin Chuan, Liu Enli, Feng Guorui, et al. Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 31(11): 4523−4537
    [21]
    Zhang Han, Goodfellow I, Metaxas D, et al. Self-attention generative adversarial networks [C] //Proc of the 36th Int Conf on Machine Learning. New York: ICML, 2019: 7354−7363
    [22]
    Wang Zhihui, Wang Shijie, Zhang Pengbo, et al. Weakly supervised fine-grained image classification via correlation-guided discriminative learning [C] //Proc of the 27th ACM Int Conf on Multimedia. New York: ACM, 2019: 1851−1860
    [23]
    Cao Bingyi, Araujo A, Sim J. Unifying deep local and global features for image search [C] //Proc of the 16th European Conf on Computer Vision. Berlin: Springer, 2020: 726−743
    [24]
    Hjelm R D, Fedorov A, Lavoie-Marchildon S, et al. Learning deep representations by mutual information estimation and maximization [C] //Proc of the 7th Int Conf on Learning Representations. Washington: ICLR, 2019: 9153−9176
    [25]
    Lin T Y, Maire M, Belongie S, et al. Microsoft coco: Common objects in context[C]//Proc of the 10th European Conf on Computer Vision. Berlin: Springer, 2014: 740−755
    [26]
    Selvaraju R R, Cogswell M, Das A, et al. Grad-cam: Visual explanations from deep networks via gradient-based localization[C]//Proc of the 15th IEEE Int Conf on Computer Vision. Piscataway, NJ: IEEE, 2017: 618−626
    [27]
    Douze M, Tolias G, Pizzi E, et al. The 2021 image similarity dataset and challenge [J]. arXiv preprint. arXiv: 2106.09672, 2021
    [28]
    Tang Zhenjun, Zhang Xianquan, Li Xianxian, et al. Robust image hashing with ring partition and invariant vector distance[J]. IEEE Transactions on Information Forensics and Security, 2015, 11(1): 200−214
    [29]
    Tang Zhenjun, Zhang Xianquan, Huang Liyan, et al. Robust image hashing using ring-based entropies[J]. Signal Processing, 2013, 93(7): 2061−2069 doi: 10.1016/j.sigpro.2013.01.008
    [30]
    Qin Chuan, Chen Xueqin, Luo Xiangyang, et al. Perceptual image hashing via dual-cross pattern encoding and salient structure detection[J]. Information Sciences, 2018, 423: 284−302 doi: 10.1016/j.ins.2017.09.060
  • Related Articles

    [1]Lu Sidi, He Yuankai, Shi Weisong. Vehicle Computing: An Emerging Computing Paradigm for the Autonomous Driving Era[J]. Journal of Computer Research and Development, 2025, 62(1): 2-21. DOI: 10.7544/issn1000-1239.202440538
    [2]Chen Xiao, Huang Muhong, Tian Yifan, Wang Yan, Cao Sheng, Zhang Xiaosong. Internet of Vehicles Data Sharing Scheme via Blockchain Sharding[J]. Journal of Computer Research and Development, 2024, 61(9): 2246-2260. DOI: 10.7544/issn1000-1239.202330899
    [3]Li Ke, Ma Sai, Dai Penglin, Ren Jing, Fan Pingzhi. Wireless Resource Allocation Algorithm Based on Multi-Objective Deep Reinforcement Learning for Vehicle-to-Vehicle Communications[J]. Journal of Computer Research and Development, 2024, 61(9): 2229-2245. DOI: 10.7544/issn1000-1239.202330895
    [4]Le Junqing, Tan Zhouyong, Zhang Di, Liu Gao, Xiang Tao, Liao Xiaofeng. Secure and Efficient Federated Learning for Continuous IoV Data Sharing[J]. Journal of Computer Research and Development, 2024, 61(9): 2199-2212. DOI: 10.7544/issn1000-1239.202330894
    [5]Tang Xiaolan, Liang Yuting, Chen Wenlong. Multi-Stage Federated Learning Mechanism with non-IID Data in Internet of Vehicles[J]. Journal of Computer Research and Development, 2024, 61(9): 2170-2184. DOI: 10.7544/issn1000-1239.202330885
    [6]Zheng Yingying, Zhou Junlong, Shen Yufan, Cong Peijin, Wu Zebin. Time and Energy-Sensitive End-Edge-Cloud Resource Provisioning Optimization Method for Collaborative Vehicle-Road Systems[J]. Journal of Computer Research and Development, 2023, 60(5): 1037-1052. DOI: 10.7544/issn1000-1239.202220734
    [7]Han Mu, Yang Chen, Hua Lei, Liu Shuai, Ma Shidian. Vehicle Pseudonym Management Scheme in Internet of Vehicles for Mobile Edge Computing[J]. Journal of Computer Research and Development, 2022, 59(4): 781-795. DOI: 10.7544/issn1000-1239.20200620
    [8]Yao Hailong, Yan Qiao. Cryptanalysis and Design of Anonymous Authentication Protocol for Value-Added Services in Internet of Vehicles[J]. Journal of Computer Research and Development, 2022, 59(2): 440-451. DOI: 10.7544/issn1000-1239.20200487
    [9]Tang Xiaolan, Xu Yao, Chen Wenlong. Bus-Data-Driven Forwarding Scheme for Urban Vehicular Networks[J]. Journal of Computer Research and Development, 2020, 57(4): 723-735. DOI: 10.7544/issn1000-1239.2020.20190876
    [10]Wang Xiufeng, Cui Gang, Wang Chunmeng. The Dynamical Prediction of V2V Link Duration in Urban VANETs[J]. Journal of Computer Research and Development, 2017, 54(12): 2721-2730. DOI: 10.7544/issn1000-1239.2017.20158391

Catalog

    Article views (34) PDF downloads (16) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return