4.7 Article

Robust Image Hashing with Tensor Decomposition

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TKDE.2018.2837745

Keywords

Image hashing; tensor construction; tensor decomposition; Tucker decomposition

Funding

  1. National Natural Science Foundation of China [61562007, 61672177, 61762017]
  2. National Key R&D Program of China [2016YFB1000905]
  3. Guangxi Bagui Scholar Teams for Innovation and Research
  4. Guangxi Natural Science Foundation [2017GXNSFAA198222, 2015GXNSFDA139040]
  5. Project of Guangxi Science and Technology [Gui-KeAD17195062]
  6. Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing
  7. Guangxi Key Lab of Multi-source Information Mining Security [16-A-02-02]

Ask authors/readers for more resources

This paper presents a new image hashing that is designed with tensor decomposition (TD), referred to as TD hashing, where image hash generation is viewed as deriving a compact representation from a tensor. Specifically, a stable three-order tensor is first constructed from the normalized image, so as to enhance the robustness of our TD hashing. A popular TD algorithm, called Tucker decomposition, is then exploited to decompose the three-order tensor into a core tensor and three orthogonal factor matrices. As the factor matrices can reflect intrinsic structure of original tensor, hash construction with the factor matrices makes a desirable discrimination of the TD hashing. To examine these claims, there are 14,551 images selected for our experiments. A receiver operating characteristics (ROC) graph is used to conduct theoretical analysis and the ROC comparisons illustrate that the TD hashing outperforms some state-of-the-art algorithms in classification performance between the robustness and discrimination.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Engineering, Electrical & Electronic

Reversible Data Hiding With Hierarchical Embedding for Encrypted Images

Chunqiang Yu, Xianquan Zhang, Xinpeng Zhang, Guoxiang Li, Zhenjun Tang

Summary: This study proposes a new reversible data hiding method with hierarchical embedding, which achieves a high embedding payload through hierarchical label map generation and embedding technique. Experimental results show that the proposed method outperforms other methods in terms of payload.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article Computer Science, Information Systems

Robust Long-Term Tracking via Localizing Occluders

Binfei Chu, Yiting Lin, Bineng Zhong, Zhenjun Tang, Xianxian Li, Jing Wang

Summary: This article proposes a novel occluder-aware representation learning framework to improve tracking performance by localizing occluders and guiding representation learning. Experimental results show that this method achieves state-of-the-art performance in multiple benchmark tests.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2023)

Article Engineering, Electrical & Electronic

Perceptual Hashing With Complementary Color Wavelet Transform and Compressed Sensing for Reduced-Reference Image Quality Assessment

Mengzhu Yu, Zhenjun Tang, Xianquan Zhang, Bineng Zhong, Xinpeng Zhang

Summary: This paper proposes a perceptual hashing algorithm for reduced-reference IQ assessment using complementary color wavelet transform and compressed sensing. Experimental results demonstrate that the proposed algorithm outperforms some state-of-the-art algorithms in terms of image classification and RR IQ assessment.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article Computer Science, Hardware & Architecture

Perceptual Image Hashing With Locality Preserving Projection for Copy Detection

Ziqing Huang, Zhenjun Tang, Xianquan Zhang, Linlin Ruan, Xinpeng Zhang

Summary: Perceptual image hashing is an effective and efficient method for identifying images in large-scale databases. One of its challenges is finding the right balance between robustness and discrimination. This study proposes a novel hashing method, HLPP, which utilizes Gabor filtering and LPP to improve robustness and discrimination. The results show that HLPP outperforms state-of-the-art algorithms in benchmark databases and copy detection experiments.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

Unifying Dual-Attention and Siamese Transformer Network for Full-Reference Image Quality Assessment

Zhenjun Tang, Zhiyuan Chen, Zhixin Li, Bineng Zhong, Xianquan Zhang

Summary: Image Quality Assessment (IQA) is a critical task of computer vision. In this paper, a novel method called UniDASTN is proposed for FR-IQA, which combines the Dual-Attention and Siamese Transformer Network. The proposed method effectively evaluates the distortion in distorted images through the spatial attention module and the dual-attention strategy. The experiments on standard IQA databases demonstrate that UniDASTN outperforms some state-of-the-art FR-IQA methods.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

Heterogeneous graph convolution based on In-domain Self-supervision for Multimodal Sentiment Analysis

Yufei Zeng, Zhixin Li, Zhenjun Tang, Zhenbin Chen, Huifang Ma

Summary: This paper proposes a method called HIS-MSA for multimodal sentiment analysis, which addresses the challenges of fully leveraging domain-specific knowledge and lacking effective integration methods by utilizing in-domain self-supervised multi-task learning and heterogeneous graph convolution. Experimental results demonstrate an average improvement of approximately 1.5 points in all metrics compared to the current state-of-the-art model.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Engineering, Electrical & Electronic

Leveraging Local and Global Cues for Visual Tracking via Parallel Interaction Network

Yaozong Zheng, Bineng Zhong, Qihua Liang, Zhenjun Tang, Rongrong Ji, Xianxian Li

Summary: Despite the importance of both local and context information for robust tracking, existing methods in the field of CNN and Transformer mainly focus on one aspect. To address this issue, we propose the SiamPIN tracker, which consists of two modules: Global Aggregation Block (GAB) and Local Process Block (LPB). GAB captures the global context using a transformer-based architecture, while LPB extracts local information using a CNN model. These modules are connected consecutively to enable the interaction of global-local information flow. The proposed tracker achieves state-of-the-art performance on benchmark datasets while maintaining real-time running speed.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Robust Tracking via Uncertainty-Aware Semantic Consistency

Jie Ma, Xiangyuan Lan, Bineng Zhong, Guorong Li, Zhenjun Tang, Xianxian Li, Rongrong Ji

Summary: In this paper, a robust anchor-free based tracking model with uncertainty estimation is proposed. A data-driven uncertainty estimation strategy is used to generate uncertainty-aware features. A pyramid-wise cross correlation operation is constructed to extract multi-scale semantic features for enhancing tracking robustness. Experimental results show that our tracker achieves competitive performance with a frame rate of 130 FPS.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2023)

Article Computer Science, Artificial Intelligence

Efficient Hashing Method Using 2D-2D PCA for Image Copy Detection

Xiaoping Liang, Zhenjun Tang, Ziqing Huang, Xianquan Zhang, Shichao Zhang

Summary: This paper proposes an efficient hashing method for image copy detection using 2D-2D PCA. By combining PCT and 2D-2D PCA, rotation-invariant low-dimensional features are extracted, and vector distances are used for robust and compact hash construction. Experimental results demonstrate that the proposed method outperforms representative hashing methods in classification and copy detection performance.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)

Article Computer Science, Artificial Intelligence

Fisher Regularized e-Dragging for Image Classification

Zhe Chen, Xiao-Jun Wu, Josef Kittler

Summary: This paper proposes a Fisher regularized e-dragging framework for image classification, which improves the intraclass compactness and interclass separability of relaxed labels. The Fisher criterion and e-dragging technique are integrated into a unified model, achieving superior performance compared to other classification methods.

IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS (2023)

Article Engineering, Electrical & Electronic

Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding

Chunqiang Yu, Xianquan Zhang, Chuan Qin, Zhenjun Tang

Summary: This study proposes a new reversible data hiding method using Chinese remainder theorem-based secret sharing and hybrid coding, which achieves high embedding capacity and good security properties.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2023)

Article Computer Science, Hardware & Architecture

A Deep Learning Feature Fusion Based Health Index Construction Method for Prognostics Using Multiobjective Optimization

Zhen Chen, Di Zhou, Enrico Zio, Tangbin Xia, Ershun Pan

Summary: Degradation modeling and prognostics are important for system health management. This study proposes a novel feature fusion-based HI construction method with deep learning and multiobjective optimization. Multiple degradation features are fused by a deep neural network (DNN) and several desired properties for prognostics are used to formulate the objective functions of DNN training. A multiobjective optimization model is generated to balance the complexity and performance of the fusion model. The proposed method is illustrated with two cases to demonstrate its effectiveness and robustness.

IEEE TRANSACTIONS ON RELIABILITY (2023)

Article Computer Science, Information Systems

Robust Image Hashing With Isomap and Saliency Map for Copy Detection

Xiaoping Liang, Zhenjun Tang, Jingli Wu, Zhixin Li, Xinpeng Zhang

Summary: This paper proposes a robust image hashing algorithm based on Isometric Mapping and saliency map for copy detection, which outperforms state-of-the-art algorithms in classification and copy detection performance.

IEEE TRANSACTIONS ON MULTIMEDIA (2023)

Article Engineering, Electrical & Electronic

Secret Image Restoration With Convex Hull and Elite Opposition-Based Learning Strategy

Yu Dong, Xianquan Zhang, Chunqiang Yu, Zhenjun Tang

Summary: Digital images can easily be corrupted during transmission. Most existing image denoising methods fail to effectively restore the secret image extracted from a corrupted stego image. To address this issue, a new method based on convex hull and elite opposition-based learning strategy is proposed. The method calculates pixel distortion values of the corrupted secret image and classifies them into trustable and untrusted pixels. Trustable pixels within a convex hull restore the untrusted pixel in the hull, and the remaining untrusted pixels are restored using an elite opposition-based learning strategy. Experimental results demonstrate that the proposed method outperforms state-of-the-art methods in terms of recovered secret image quality.

IEEE SIGNAL PROCESSING LETTERS (2023)

Article Computer Science, Artificial Intelligence

SiamBAN: Target-Aware Tracking With Siamese Box Adaptive Network

Zedu Chen, Bineng Zhong, Guorong Li, Shengping Zhang, Rongrong Ji, Zhenjun Tang, Xianxian Li

Summary: SiamBAN is a simple and effective tracker that predicts target boxes in a per-pixel fashion through a fully convolutional network, addressing the challenge of variation in scales or aspect ratios. It divides the tracking problem into classification and regression tasks to handle inconsistency, and achieves promising performance in benchmark tests.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2023)

No Data Available