2019
DOI: 10.1109/access.2019.2911207
|View full text |Cite
|
Sign up to set email alerts
|

Robust Image Hashing Scheme Based on Low-Rank Decomposition and Path Integral LBP

Abstract: This paper presents a robust image hashing algorithm that exploits low-rank decomposition and path integral local binary pattern (pi-LBP), referred to LRPL hashing. The proposed algorithm generates a compact binary sequence from a low-rank component of the normalized image as the hash code. Considering the excellent texture structure description ability of pi-LBP features, the new hashing algorithm extracts a feature vector from a low-rank feature matrix with pi-LBP. The pi-LBP feature vector is then encrypted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 40 publications
0
6
0
Order By: Relevance
“…Tang's method shows good results in the application of image quality assessment, but it can only resist rotation within 5°. Yang et al [34] used low-rank decomposition and LBP to generate a hash. Yang's method can only resist rotation of 3°.…”
Section: Related Workmentioning
confidence: 99%
“…Tang's method shows good results in the application of image quality assessment, but it can only resist rotation within 5°. Yang et al [34] used low-rank decomposition and LBP to generate a hash. Yang's method can only resist rotation of 3°.…”
Section: Related Workmentioning
confidence: 99%
“…It may be used for privacy-preserving feature extraction in a remote cloud server hosted by the third party. In recent years, researchers have studied local binary patterns (LBP) computation [38] in the encrypted domain. Sultana and Shubhangi presented a privacy-preserving LBP computation outsourcing protocol (PP-LBP) that enables extracting LBP features from encrypted images [20].…”
Section: Related Workmentioning
confidence: 99%
“…Some analyses and experimental results demonstrate that the proposed privacy-preserving feature extraction scheme for BTC-compressed images is efficient and secure, and it can be used to secure image computation applications in cloud computing. A local sensitive hash algorithm was employed to produce the searchable index because of the wide application of image hash [22] in image retrieval. The chaotic encryption approach was used to protect the security of images and indexes.…”
Section: Introductionmentioning
confidence: 99%