Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Information Technology Journal
Year: 2011  |  Volume: 10  |  Issue: 1  |  Page No.: 120 - 126

An Image Hashing Scheme based on Mean-removed Vector Quantization for Multiple Purposes

Mei-Lei Lv and Zhe-Ming Lu    

Abstract: Perceptual hashing has been proved to be an effective solution for multimedia indexing, authentication or watermarking. Traditional perceptual hashing schemes are typical designed only for one purpose. This study presents a multipurpose image-hashing scheme based on Mean-Removed Vector Quantization (MRVQ) for both copyright protection and content authentication. The main idea is to perform MRVQ on the original image to yield two index tables, one for copyright protection and the other for content authentication. The original gray-level image is first divided into non-overlapping small blocks. The mean value for each block is calculated and quantized by the scalar quantizer to get a mean index and the quantized mean is removed from the image block to obtain the residual vector that is further quantized by the vector quantizer to obtain the residual index. All obtained mean indices constructed the mean index table and all obtained residual indices construct the residual index table. The obtained two index tables are then transformed into two intermediate binary images based on two different mapping functions, respectively. One mapping function is based on the variance of indices in a 3x3 neighborhood and the other mapping function is based on the number of indices larger than the mean of indices in a 3x3 neighborhood. Finally, the authentication mark and permuted copyright logo are respectively XOR-ed with the two intermediate binary images to obtain final authentication and protection fingerprints. Experimental results demonstrate the effectiveness of the proposed scheme.

Cited References   |    Fulltext    |   Related Articles   |   Back
  Related Articles

Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility