 Research
 Open Access
 Published:
Blockbased image hashing with restricted blocking strategy for rotational robustness
EURASIP Journal on Advances in Signal Processing volume 2012, Article number: 77 (2012)
Abstract
Image hashing is a potential solution for image content authentication (a desired image hashing algorithm should be robust to common image processing operations and various geometric distortions). In the literature, researchers pay more attention to blockbased image hashing algorithms due to their robustness to common image processing operations (such as lossy compression, lowpass filtering, and additive noise). However, the blockbased hashing strategies are sensitive to rotation processing operations. This indicates that the robustness of the blockbased hashing methods against rotation operations is an important issue. Towards this direction, in this article we propose a restricted blocking strategy by investigating effect of two rotation operations on an image and its blocks in both theoretical and experimental ways. Furthermore, we apply the proposed blocking strategy for the recently reported nonnegative matrix factorization (NMF) hashing. Experimental results have demonstrated the validity of the blockbased hashing algorithms with restricted blocking strategy for rotation operations.
1. Introduction
With the development of the Internet and multimedia processing techniques, more and more digital media products become available through different online services and easy to distribute illegal copies. Recently, multimedia hashing functions [1, 2] have been introduced as a potential solution for tracing the unauthorized use of digital media files since the traditional cryptography hash functions (such as MD5, SHA1) cannot satisfy the requirements of multimedia content authentication because the cryptographic hash is sensitive to every single bit of input. In the literature, the techniques used for image authentication can be classified into two categories: (1) watermark based [3–6] and (2) media hash based [7, 8]. The main difference between a watermark (robust [3], reversible [4], fragile [5] and semifragile [6]) and a hash is that the embedding process of the former requires the content of the media to change. Robustness of media hashing is a desired aspect. Robustness means that the hash should be resistant to contentpreserving signal processing operations, e.g., image hashing should be insensitive to those common geometric deformation, lossy compression and filtering operations, which do distort the image but preserve its visual quality.
Media hashing can be broadly classified into audio hashing [9, 10], video hashing [11, 12] and image hashing [7, 8, 13–21] according to the diversity of media dimensionality space. In this article, we are focusing on image hashing. In the literature, there are a lot robust image hash functions. In [13], Fridrich and Goljan addressed a robust image hash for tamper control problem by mapping image blocks into keybased template. In [14], a robust image hash was used for indexing and database searching by using the statistic property of wavelet coefficients of image block. Perceptual image hashing was also used for contentdependent key generation in video watermarking [15]. The hash methods proposed in [13, 14] were aiming to coping with common image processing operations. With another consideration of coping with geometric distortions, some researchers presented a few special image hash functions, such as in [16–21]]. In [16], the authors introduced an iterative geometric image hash method by quantizing the lowfrequency components of an image into a binary image, which is further filtered by iterative filter in order to obtain a stable geometric shape to generate the hash with resistance to geometric distortion. In [17], the authors proposed two robust hashing schemes based on the invariance of FourierMellin transform to affine transform, and later the schemes were improved by considering both security and robustness [18]. In [19], Lu and Hsu addressed a meshbased image hashing method by using the mesh insensitivity to geometric distortions. Monga and Mihçak addressed a robust and secure image hashing function in [20], which provides robustness to affine transforms since the effect of geometric attacks on image blocks in the spatial domain manifests (approximately) as independent and identically distributed noise on nonnegative matrix factorization vectors. By using the insensitivity of histogram in shape to geometric attacks, Xiang et al. proposed a histogrambased image hashing algorithm for various geometric distortions in [21]. In [5], a keydependent JPEG2000based robust hashing method was addressed for secure image authentication. Considering various attacks, Liu et al. [6] introduced Fast JohnsonLindenstrauss Transform and contentbased fingerprint, to combine different features together.
From the above introduction, we can see that the strategy to divide an image into blocks for hashing is often used (such as [13, 14, 20]). Usually, blockbased image hashing algorithms can provide an inherent ability to tamper control problem and are robust to common image processing operations. However, image blockbased hash functions are very sensitive to rotation operations since the rotation will make the content difference between an image block and its rotated versions. Towards this problem, in this article we investigate the effect of rotation operations on an image and its blocks. Our motivation is to find the effect and then propose a new blocking strategy to improve the performance of the blockbased image hashing algorithm for rotation operations. There are two kinds of rotation modes: loose based and crop based. The main difference between a loose rotation and a crop rotation is that output images of the former have a bigger size than the rotated image while the later remains the size by cropping the boundaries. By analyzing the two modes of rotation operations in mathematical way, we propose a restricted randomized blocking strategy to eliminate the effect of rotation. The basic idea is to extract the central content of an image for the use of a blockbased hashing. In order to measure the effectiveness of the proposed blocking strategy, we take nonnegative matrix factorization (NMF) hashing algorithm proposed in [20] as an example of blockbased hashing algorithms to report experimental results. Simulation results show that the hashing algorithm with the proposed blocking strategy can provide a stronger robustness to the two rotational operations.
The remainder of this article is organized as follows. In the following section, we describe the computation process of a NMF hashing algorithm. This is followed by a detailed mathematical analysis on the effect of two image rotation modes on images. By using the new blocking method, we then test the robustness performance of the NMF hashing algorithm for two image rotation operations. Finally, we draw the conclusions.
2. NMFbased image hashing
2.1. NMF
The NMF is a Matrix decomposition method [22]. It is restricted by the conditions that in the Matrix all elements are nonnegative. The mathematical description is addressed as follows:
Given a m × n nonnegative matrices V, looking for nonnegative factor matrix W and H, making
Here, each column in W can be regarded as a vector. Therefore, each column in V is the linear combination of the base vectors. NMF is an approximation procedure to the original matrix in a distance metric. In the NMF literature, two popular cost functions have been studied. The first is the classical Euclidean distance, given by
Another measure usually used in practice is KL divergence (KullbackLeibler divergence)
The above measure is known as the generalized KullbackLeibler (KL) divergence. The NMF's goal is to minimize the distance between matrix V and WH. In this article, we choose Euclidean distance as the objective function of the NMF. Use the following iteration formulas [16], to obtain the matrix W and H until the Θ_{ E }(W, H) value reaches a local minimum:
2.2. NMFNMFSQ hashing algorithm
Figure 1 shows the calculation process of a NMFNMFSQ hashing algorithm proposed in [20], described as follows:

1)
Given an image, using the private key k _{1} to pseudorandomly select subimages A _{ i },(A _{ i }∈ R ^{m×m}, 1 ≤ i ≤ p).

2)
Obtain the NMF of each subimage:
$${A}_{i}\approx {W}_{i}{F}_{i}^{T},\left({W}_{i},{F}_{i}\in {R}^{m\times {r}_{1}}\right),$$(5)
where r_{1}, (r_{1} ≪ m) is the rank. In this way, we get 2p matrix in size m × r_{1}.

3)
According to the key k _{2}, randomly rearrange these matrixes to get a matrix J in size m × 2pr _{1}.

4)
Compute the NMF of J on the rank r _{2},(r _{2} ≪ min(m, 2pr _{1}))
$$\mathbf{J}\approx \mathbf{W}\mathbf{H}\left(\mathbf{W}\in {R}^{m\times {r}_{2}},\mathbf{H}\in {R}^{{r}_{2}\times 2p{r}_{1}}\right),$$(6)
In such a way we obtain a m × r_{2} dimensional matrix W and a r_{2}× 2pr_{1} dimensional matrix H.

5)
Making rows of W and columns of H in series to get a vector ${h}_{\left({k}_{1},{k}_{2}\right)}^{\mathsf{\text{NMFNMF}}}\left(I\right)$ in length N. Under the control of the secret key k _{3}, obtaining a weight vector sets ${\left\{{t}_{i}\right\}}_{i=1}^{M},\left(M\ll N,{t}_{i}\in {R}^{N}\right)$, making the inner product between each weight vector $\left\{{t}_{i}\right\}$ and ${h}_{\left({k}_{1},{k}_{2}\right)}^{\mathsf{\text{NMFNMF}}}\left(I\right)$ to obtain hash vector of the NMFNMFSQ algorithm: (In the following equation the expression 〈a, b〉 indicates the inner product between a and b).
$${h}_{\left({k}_{1},{k}_{2},{k}_{3}\right)}^{\mathsf{\text{NMFNMFSQ}}}\left(I\right)=\left\{\u27e8{h}_{\left({k}_{1},{k}_{2}\right)}^{\mathsf{\text{NMFNMF}}}\left(I\right),{t}_{1}\u27e9,\dots ,\u27e8{h}_{\left({k}_{1},{k}_{2}\right)}^{\mathsf{\text{NMFNMF}}}\left(I\right),{t}_{M}\u27e9\right\},$$(7)
The above hash vector ${h}_{\left({k}_{1},{k}_{2},{k}_{3}\right)}^{\mathsf{\text{NMFNMFSQ}}}\left(I\right)$ was not quantized. Therefore, each element in the vector is a real number. Similarity of the two hash vectors was measured by using Euclidean distance.
The robustness principle of the NMF hashing algorithm proposed in [20] can be summarized as follows: (1) Divide an image into blocks and then calculate the hash, in such a way that the hash is able to trace tampering and locate; (2) The hash value is a low rank decomposition by using NMF mathematical method after an image is divided into blocks,^{a} therefore the algorithm has a good robustness for lossy compression, lowpass filtering and additive noise operations; (3) Since the hash is computed after an image size normalization step, the hash value is resistant to cropping and scaling operations. However, the algorithm is sensitive to a rotation manipulation since it will modify the content of a block.
3. Restricted blocking strategy for rotation
In this article, we observe the influence of two rotation operations on the NMF image hashing algorithm [20], that is, an image rotation operation will modify the content of an image block in two aspects: (1) pixel magnitude distortion due to the interpolation in the rotation [23] and (2) phase change. The NMF hashing algorithm [20] can overcome the magnitude distortion since the distortion in amplitude can be taken as an additive noise, but it is very sensitive to the phase change due to the rotation because the image block in content has been modified. The bigger rotation angle is performed, the more distortion in the block will be introduced. Towards the effect, in this section we will analyze the impact of a rotation processing operation on an image and its blocks in both theoretical and experimental ways. Furthermore, we propose a restricted random blocking strategy for the algorithm [20] so as to improve the rotational robustness while remaining its resistance to other attacks.
3.1. An image after rotation
There are two different modes of image rotation processing operations: 'loose' based and 'crop' based [24]. For the loosebased rotation mode, output images have a bigger size but the original image content in size remains unchanged; In cropbased rotation mode, output images have the same size as input image, but include only the central portion of the rotated image. The influence factors of the two rotation modes on an image are described as follows.
3.1.1. Rotation with the loose mode
We can see that under this mode of rotation, output images have a bigger size than the rotated image. As shown in Figure 2, two resulted images with different angles plotted in Figure 2b,c have a bigger size than the original one as shown in Figure 2a. The basic reason is that, after the rotation some redundant pixels (black regions with zerovalue pixels) are padded in four homogeneous areas of the rotated image. These homogeneous regions can be processed by using line detection techniques [25]. It is worth noting that Figure 2e,f in content is more rich than the original image after a size normalization. The size normalization operation in reference [20] was applied to deal with all images from the same source to the same size so that the images can be blocked for hashing. In referring to Figure 2, we can figure out that the loose rotation operation will make a serious affection on the hashing algorithm [20] since all image blocks in content will be modified due to the phase distortion.
In order to eliminate the effect of the padded pixels (caused by the loose rotation) on image blocks, our strategy is to apply only the central content of an candidate image for blockbased hashing, such as the circled region marked in Figure 2d. In such a way, we can avoid the effect of the resulted redundant pixels. For the rotated images as plotted in Figure 2e,f, only the central part in the blue circle is chosen for hashing.
For a clear description, in this article we denote the circle radius in Figure 2d as the radius of Effective Block Region (EBR), in length R. According to the principle of geometry mathematics, the R value can be derived from the following Equations (8) and (9).
Denote the original image as □ABCD, which is rotated by using the "loose" mode with the angle θ, and then be normalized to the same size as the original one. As shown in Figure 3, the square □EFGH is the rotated version of □ABCD with the loose mode. In this case, the difference between □ABCD and □EFGH indicates the resulted redundant pixels. In referring to Figure 3, we have the following the geometric relationships:
So $R=\frac{1}{2}\overline{FG}$ since the line $\overline{FG}$ in length is shorter than $\overline{EF}$.
We can see from Figure 3 and the R expression that for overcoming the impact of the redundant pixels caused by the rotation, we should select the central content of an image for blockbased hashing. For the different rotation angle, the central content is different. Supposed the rotation angle θ is between zero and 45° (for other rotation angles, the analysis is similar). The bigger rotation angle is, the EBR radius (R) should be smaller so as to guarantee the blockbased hash value resistant to the loose rotation operation.
3.1.2. Rotation with the crop mode
In order to better depict the effect of the crop rotation, here we adopt the wellknown image 'Lena' as another example image. From Figure 4, we can observe the effect of the crop rotation on the image, that is, output images have the same size as input image and include only the central portion of the rotated image. Under the rotation, part of the content is cropped (replaced by zerovalue pixels). For different rotation angles, the cropped pixels (replaced by zerovalue pixels) in number are different, corresponding to the content in the white circle of the subplots in Figure 4b,c.
Considering the effect of the rotation mode, our strategy is to extract the region as shown in the circle in Figure 5 for blocking. Suppose that the square □ABCD denotes the original image, then the square □EFGH is the one rotated. According to our analysis, the circle is the region computed for blocking in such a way that a blockbased hashing can avoid the effect of those pixels (to be cut and then filled by zerovalue pixels).
3.2. An block after rotation
In the Section 1, we have analyzed the effect of rotation with two different modes on an image. Furthermore, in this section we are going to investigate the effect of the two rotation processing operations on an image block.
From the above analysis regarding the crop rotation mode, we have known that the rotation operation modifies the phase of pixels in the EBR (The amplitude distortion due to the interpolation is minor [23]). Therefore, there are existing public pixels before and after the rotation. A public pixel means that a pixel is still fallen into the same block under the rotation. It is worth noting that the ratio of these public pixels to the pixels in a block has an important role for the robustness of the NMFbased hashing algorithm [20]. This has been fully proven in Section 4 with extensive testing.
In order to find a better way to block an image for hashing, in theoretical way we are going to measure the ratio of public pixels in an image block after a rotation operation. The image blocks can be divided into two categories: (1) the image center in the block and 2) the center not in the block. The effect of the rotation on a block is respectively discussed as follows.
3.2.1. Case 1: image center in the block
In Figure 6, the point O denotes the center of the EBR of an image. Suppose □ABCD is an image block, after image rotation of θ° the pixels in the □ABCD will be shifted to the □EFGH. For the block □ABCD, the ratio of public pixels against the block pixels after the rotation is equal to the ratio of the polygon P'KN'GLD to the block in area ($\overline{AD}$ crosses $\overline{EF}$ at ${P}^{\prime},\overline{OQ}$ crosses $\overline{EF}$ at $P,\overline{FG}$ crosses $\overline{AB}$ at ${N}^{\prime},\overline{OT}$ crosses $\overline{AB}$ at N). From the expressions: $\overline{KN}=\overline{AN}\overline{AK}$, $\overline{KP}=\overline{FP}\overline{FK}$, $\overline{AK}=\overline{FK}$ and $\overline{AN}=\overline{FP}$, we have $\overline{KN}=\overline{KP}$. As a result, we conclude that the line $\overline{OK}$ is the bisector of the angle ∠PON. Similarly, we can prove OL is ∠PON's bisector. According to the geometric relations $\overline{AK}=\overline{AN}\overline{KN}$ and $\overline{KN}=\overline{ON}\phantom{\rule{0.3em}{0ex}}\cdot \phantom{\rule{0.3em}{0ex}}\text{tan}\frac{\theta}{2}$, the area of the triangle Δ AKP' is
Similarly, we have:
where $\overline{LG}=\overline{UG}\overline{UL}$ and $\overline{UL}=\overline{UO}\phantom{\rule{0.3em}{0ex}}\cdot \text{tan}\frac{\theta}{2}$. The area of trapezoidal $A{N}^{\prime}MD$ is:
Therefore, the area of hexagon ${P}^{\prime}K{N}^{\prime}GLD$ is:
Suppose that the distance of the block center to the image center O is R_{1}, the block is a square in size a × a, then the overlapped area (public pixels) between □ABCD and □EFGH can be computed as:
where : $\overline{AK}=\frac{a}{2}\left({R}_{1}+\frac{a}{2}\right)\cdot \text{tan}\frac{\theta}{2}$, $\overline{LG}=\frac{a}{2}\left({R}_{1}\frac{a}{2}\right)\cdot \text{tan}\frac{a}{2}$, when ${R}_{1}>\frac{a}{2}$.
3.2.2. Case 2: image center not in the block
We can see from Figure 7 that in this case, the overlapped region is the octagon VILSQNUT, which is:
According to the geometric expressions: $\overline{AK}=\overline{JF}$$\overline{AI}=\overline{IF}$, we have $\overline{IK}=\overline{IJ}$. So, we conclude that the line $\overline{OI}$ is the bisector of the angle ∠JOK.
Similarly, we can prove that the line $\overline{ON}$ is ∠XOP' s bisector. So, we have
where $\overline{AI}=\overline{AK}\overline{IK}.$ Similarly, we have
where NG = NP + PG. And
where $\overline{SG}=\overline{FG}\overline{FL}\overline{LS}$, $\overline{FL}=\overline{AI}\cdot \text{tan}\theta $, and $\overline{LS}=\overline{\frac{LB}{\text{sin}\theta}}=\frac{1}{\text{sin}\theta}\left[\overline{AB}\overline{AI}\left(1+\frac{1}{\text{cos}\theta}\right)\right]$.
At the same time, we have
where $\overline{AL}=\overline{AI}\left(1+\frac{1}{\text{cos}\theta}\right)$, $\overline{MD}=\overline{DC}+\overline{CM}$, $\overline{CM}=\overline{\frac{NG}{\text{cos}\theta}}\overline{XC}+\overline{NP}.$
From the above equations, we can compute the overlapped area (public pixels) as:
where the length of the lines can be calculated from Equations (17), (18), (19), and (20).
Referring to Figures 6 and 7, from the above theoretical analysis results formulated in Equations (14) and (21) we can conclude that, the ratio of public pixels after the rotation is related to the distance between the block center and the image center, the block size and the rotation angle. The smaller distance between a block and the image center is, or the smaller the rotation angle is, or the larger the block size is, so the bigger the ratio of public pixels after the rotation is, as a result the stronger rotational robustness can be achieved from a blockbased hashing algorithm. The above mathematical analysis results regarding the ratio of public pixels against the rotation is beneficial to improving the rotational robustness of those blockbased hashing algorithms. The strategy is to choose a desired region (the central part of an image), and then divide the region into blocks in an ideal size. The region and the block in size can be computed in advance by referring to the rotation angle that an image may suffer from. In such a way, the effect of the rotation operations will be significantly reduced. Especially, the blocking strategy is useful for those image hashing schemes based on local statistical characteristics of an image, such as the NMFbased hashing algorithm proposed in [20]. For an image block, the more public pixels are staying in this block after a rotation operation, the better the statistical characteristics will be kept. In this article, we denote the blocking strategy as Restricted Blocking Strategy.
4. Experimental results
In order to measure the effectiveness of the proposed blocking strategy, we apply the blocking strategy for the NMFNMFSQ hashing algorithm proposed in [20] to estimate its contribution for rotational robustness. The testing results are reported as below.
In this section, we tested the performance of the NMFNMFSQ algorithm with the proposed blocking strategy. The parameters are set as: p = 10, m = 100, r_{1} = 1, r_{2} = 1, M = 64. The test data set is composed of four hundred 256 × 256 grey images, each image rotated in both loose and crop modes at the angle of 4, 8, 12, and 16°. Rotational robustness performance of the hashing algorithm (with the restricted blocking strategy) against the algorithm [20] (without the restricted blocking strategy) is as follows.
4.1. Robustness to the loose rotation mode
When the block radius is fixed as 100 (pixels), we can see from the ROC curves (Receiver Operation Characteristic) as shown in Figure 8 that, the ROC curves of the NMF hashing with the new blocking strategy are always on the below of those corresponding curves calculated from the algorithm [20]. The reason is that the restricted blocking method has better avoided the effect of the rotation operations. Especially, for a bigger rotation angle, the more robustness bonus for the rotation is obtained from the new blocking strategy. This indicates that the restricted blocking strategy is effective to improve the robustness to the loose rotation.
4.2. Robustness to the crop rotation mode
When the block radius is fixed as 128 (pixels), the ROC curves are plotted in Figure 9. For the rotation of 4°, the two ROC curves in Figure 9a almost stay together. As for other angles of rotation operations, the ROC curves of the hashing method using the restricted blocking strategy are always below those from the algorithm [20]. These results indicate that with new blocking strategy the NMFbased hashing algorithm can provide a better robustness to the crop rotation. When the rotation angle is bigger, the more robustness is received.
4.3. Influence of the distance between block center and image center
Corresponding to the analysis in Section 2, we have known that the ratio of public pixels to the pixels in a block is related to the distance between the block center and the image center, rotated angle and the block size used. Below, we modify the distance to measure its influence on the rotational robustness of the hashing algorithm with the restricted blocking strategy.
Note that the ratio of the public pixels in Figure 10 is represented as the percentage in curves. For the four hundred 256 × 256 test images, we perform a rotation operation of 8° with the crop mode. The block in size is 50 × 50. The effect of the distance on the ROC curve is plotted. From Figure 10, we can observe that the distance play an important role for the rotational robustness. When the distance is shorter, a block after the rotation can include more public pixels, so the robustness to the rotation is stronger. For example, the ratio of the public pixels is about 91.66% for the rotation of 8° while the distance is 20 (pixels). Also, we can see from this figure that a block with the shortest distance will provide stronger robustness (see the curve plotted with '□').
4.4. Influence of the block size
As analyzed in Section 2, the block size also plays a role on the ratio of public pixels in a block. Similarly, we perform a rotation operation on the four hundred 256 × 256 with the rotation angle of 8°. The distance between the block center and the image center is fixed to 60 pixels. With different block size, we have plotted their ROC curves as shown in Figure 11.
We can see from this figure that as the block size increases, the ratio of the public pixels increases. When the block size is 100× 100, the algorithm with the new blocking strategy obtains the best robustness performance (the ratio of the public pixels is over 89%). It is worth noting that the robustness performance in the block size of 40 × 40 is better than that of 60 × 60, which can be explained as follows. Though the larger block size can increase the ratio of public pixels for the rotational robustness improvement, in the testing we have applied the same rank for NMF decomposition in such a way that the bigger the block size is, the more feature information extracted from the NMF processing operation will be lost. As a result, the uniqueness will be reduced. Therefore, a rational block size is a tradeoff between the robustness and uniqueness. For NMFbased hashing algorithm, we propose to apply the blocks of size 100× 100 for hashing.
From the above experimental analysis, we can see that the NMF hashing algorithm with the restricted blocking strategy can provide stronger performance than the recently reported NMF hashing algorithm [20] in the presence of rotation with the loose and crop modes while keeping the robustness to other attacks.
5. Conclusions and remarks
In this article, we propose a restricted random blocking strategy to improve the robustness performance of blockbased hashing algorithms for rotation operations. The contribution is described as follows:

1)
We investigate the effect of the rotation operations with the two modes (loose and crop) on an image and its blocks in both theoretical and experimental ways. As a result, we propose a restricted blocking strategy so that the redundant pixels caused by the rotation can be excluded for blocking. Experimental testing shows that this blocking strategy can improve the stability of a block for the rotation.

2)
We discuss the effect of the block size on the NMF hashing algorithm. The bigger block size is, the hashing algorithm is more resistant to rotation since a bigger block will include the more public pixels for the same rotation angle.

3)
We perform a lot of testing to measure the hashing algorithm (with the restricted blocking method) against the previous NMF hashing algorithm [20]. Experimental results show that the use of the restricted blocking strategy can effectively improve the performance of the NMF hashing algorithm for the rotation operations.
In this study, our motivation is to analyze and improve the rotational performance of the blockbased NMF hashing algorithm. In the future study, one of our considerations is to apply the restricted blocking strategy for other blockbased hashing and watermarking algorithms (such as DCTbased image hashing [13, 14], DWTbased image watermarking [26, 27]) against the loose and crop rotation operations.
References
 1.
Mihçak MK, Koval O, Voloshynovskiy S: Robust perceptual hashing of multimedia content. EURASIP 2007., (Special):
 2.
Wacha07 Special Issue: What kind of security does perceptual hashing offer? [Online].[http://wacha07.irisa.fr/Wacha07call.pdf]
 3.
Leung HY, Cheng LM: Robust watermarking scheme using wave atoms. EURASIP Journal on Advances in Signal Processing 2011, 2011: 9. Article ID 184817
 4.
Sachnev V, Kim HJ, Suresh S, Shi YQ: Reversible Watermarking Algorithm with Distortion Compensation. EURASIP Journal on Advances in Signal Processing 2010, 2010: 12. Article ID 316820
 5.
Barkat B, Sattar F: Timefrequency and timescalebased fragile watermarking methods for image authentication. EURASIP Journal on Advances in Signal Processing 2010, 2010: 14. Article ID 408109
 6.
Liu H, Yao X, Huang J: SemiFragile Zernike MomentBased Image Watermarking for Authentication. EURASIP Journal on Advances in Signal Processing 2010, 2010: 17. Article ID 341856
 7.
Laimer G, Uhl A: Keydependent JPEG2000based robust hashing for secure image authentication. EURASIP Journal on Information Security 2008, 2008: 18. Article ID 895174
 8.
Lv X, Wang ZJ: An extended image hashing concept: contentbased fingerprinting using FJLT. EURASIP Journal on Information Security 2009, 2009: 16. Article ID 859859
 9.
Mihc¸ak MK, Venkatesan R: A perceptual audio hashing algorithm: a tool for robust audio identification and information hiding. IH2001, Lecture Notes in Computer Science 2001, 2137: 5165.
 10.
Özer H, Sankur B, Memon N, Anarim E: Perceptual audio hashing functions. EURASIP J Appl Signal Process 2005, 12: 17801793.
 11.
Dittmann J, Steinmetz A, Steinmetz R: Contentbased digital signature for motion pictures authentication and contentfragile watermarking. In Proc IEEE Int Conf Multimedia Computing and Systems. Volume 2. Florence, Italy; 1999:209213.
 12.
Coskun B, Sankur B, Memon N: Spatiotemporal transform based video hashing. IEEE Trans Multimedia 2006, 8(6):11901208.
 13.
Fridrich J, Goljan M: Robust hash functions for digital watermarking. In Proc IEEE Int Conf Information Technology: Coding Computing. Las Vegas, NV , USA; 2000:178183.
 14.
Venkatesan R, Koon SM, Jakubowski MH, Moulin P: Robust image hashing. In Proc IEEE Int Conf Image Processing. Vancouver, BC, Canada; 2000:664666.
 15.
Mihçak MK, Venkatesan R: Video watermarking using image hashing. Microsoft Research Tech Rep 2001.
 16.
Mihçak MK, Venkatesan R: New iterative geometric methods for robust perceptual image hashing. DRM2001, Lecture Notes in Computer Sciences 2002, 2320: 178183.
 17.
Swaminathan A, Mao Y, Wu M: Image hashing resilient to geometric and filtering operations. In Proc IEEE Workshop on Multimedia Signal Processing. Siena, Italy; 2004:355358.
 18.
Swaminathan A, Mao Y, Wu M: Robust and secure image hashing. IEEE Trans Inf Forensics Secur 2006, 1(2):215230.
 19.
Lu S, Hsu CY: Geometric distortionresilient image hashing scheme and its applications on copy detection and authentication. Multimedia Syst 2005, 11(2):159173.
 20.
Monga V, Mihçak MK: Robust and secure image hashing via nonnegative matrix factorizations. IEEE Trans Inf Forensics Secur 2007, 2(3):376390.
 21.
Xiang S, Kim HJ, Huang J: Histogrambased image hashing scheme robust against geometric deformations. In Proc 9th ACM Multimedia and Security Workshop. Dallas, Texas, USA; 2007:121128.
 22.
Lee DD, Seung HS: Algorithms for nonnegative matrix factorization. In Neural Information Processing Systems. Volume 13. MIT Press, Cambridge, MA; 2000:556562.
 23.
Xiang S, Kim HJ, Huang J: Invariant image watermarking based on statistical features in the lowfrequency domain. IEEE Trans Circ Syst Video Technol 2008, 18(6):777790.
 24.
Image Processing Toolbox imroate function [http://www.mathworks.cn/help/toolbox/images/ref/imrotate.html]
 25.
Lefevre S, Dixon C, Jeusse C, Vincent N: A local approach for fast line detection. In Proc IEEE Int Conf Digital Signal Process. Santorini, Greece; 2002:11091112.
 26.
Cox IJ, Kilian J, Leighton T, Shamoon T: Secure spread spectrum watermarking for multimedia. IEEE Trans Image Proccess 1997, 6(6):16731687.
 27.
Yeo IK, Kim HJ: Generalized patchwork algorithm for image watermarking. Multimedia Syst 2003, 9(3):261265.
Acknowledgements
This work was supported in part by NSFC (No. 60903177), in part supported by the Fundamental Research Funds for the Central Universities (No. 21611408), Ph.D. Programs Foundation of Ministry of Education of China (No. 200805581048), and Guangzhou Municipal Science and Technology Program (No. 11C42070443).
Endnote
^{a}Feature vectors of NMF lowrank decomposition represent the information in the lowfrequency.
Author information
Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Xiang, S., Yang, J. Blockbased image hashing with restricted blocking strategy for rotational robustness. EURASIP J. Adv. Signal Process. 2012, 77 (2012). https://doi.org/10.1186/16876180201277
Received:
Accepted:
Published:
Keywords
 image hashing
 nonnegative matrix factorization
 rotation
 restricted random blocking