Random Gray code and its performance analysis for image hashing

Guopu ZHU, Sam KWONG, Jiwu HUANG, Jianquan YANG

Research output: Journal PublicationsJournal Article (refereed)peer-review

3 Citations (Scopus)

Abstract

The discrete-binary conversion stage, which plays the role of converting quantized hash vectors into binary hash strings by encoding, is one of the most important parts of authentication-oriented image hashing. However, very few works have been done on the discrete-binary conversion stage. In this paper, based on Gray code, we propose a key-dependent code called random Gray (RGray) code for image hashing, which, according to our theoretical analysis and experimental results, is likely to increase the security of image hashing to some extent and meanwhile maintains the performance of Gray code in terms of the tradeoff between robustness and fragility. We also apply a measure called distance distortion, which was proposed by Rothlauf (2002) [1] for evolutionary search, to investigate the influence of the discrete-binary conversion stage on the performance of image hashing. Based on distance distortion, we present a theoretical comparison of the encodings applied in the discrete-binary conversion stage of image hashing, including RGray encoding. And our experimental results validate the practical applicability of distance distortion on the performance evaluation of the discrete-binary conversion stage. © 2011 Elsevier B.V. All rights reserved.
Original languageEnglish
Pages (from-to)2178-2193
JournalSignal Processing
Volume91
Issue number9
DOIs
Publication statusPublished - Sept 2011
Externally publishedYes

Funding

The authors would like to thank Dr. M. Wu of University of Maryland for her comments. The authors would also like to thank the anonymous reviewers for their comments. This work was supported by the 973 Program (2011CB302204), Hong Kong RGC General Research Fund (GRF) 9041495 (CityU 115109), and NSFC (61003297).

Keywords

  • Distance distortion
  • Gray code
  • Image authentication
  • Image hashing
  • Security

Fingerprint

Dive into the research topics of 'Random Gray code and its performance analysis for image hashing'. Together they form a unique fingerprint.

Cite this