{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T17:37:21Z","timestamp":1762018641324,"version":"build-2065373602"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2019,11,30]],"date-time":"2019-11-30T00:00:00Z","timestamp":1575072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61672375 and 61170118"],"award-info":[{"award-number":["61672375 and 61170118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2019,11,30]]},"abstract":"<jats:p>Hashing method is an efficient technique of multimedia security for content protection. It maps an image into a content-based compact code for denoting the image itself. While most existing algorithms focus on improving the classification between robustness and discrimination, little attention has been paid to geometric invariance under normal digital operations, and therefore results in quite fragile to geometric distortion when applied in image copy detection. In this article, a novel effective image hashing method is proposed based on geometric invariant vector distance in both spatial domain and frequency domain. First, the image is preprocessed by some joint operations to extract robust features. Then, the preprocessed image is randomly divided into several overlapping blocks under a secret key, and two different feature matrices are separately obtained in the spatial domain and frequency domain through invariant moment and low frequency discrete cosine transform coefficients. Furthermore, the invariant distances between vectors in feature matrices are calculated and quantified to form a compact hash code. We conduct various experiments to demonstrate that the proposed hashing not only reaches good classification between robustness and discrimination, but also resists most geometric distortion in image copy detection. In addition, both receiver operating characteristics curve comparisons and mean average precision in copy detection clearly illustrate that the proposed hashing method outperforms state-of-the-art algorithms.<\/jats:p>","DOI":"10.1145\/3355394","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T13:12:30Z","timestamp":1576501950000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Efficient Image Hashing with Geometric Invariant Vector Distance for Copy Detection"],"prefix":"10.1145","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2353-5318","authenticated-orcid":false,"given":"Shiguang","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"given":"Ziqing","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, College of Intelligence and Computing, Tianjin University, Tianjin, China"}]}],"member":"320","published-online":{"date-parts":[[2019,12,16]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the IEEE International Conference on Image Processing","volume":"3","author":"Venkatesan R.","unstructured":"R. Venkatesan , S.-M. Koon , M. H. Akubowski , and P. Moulin . 2000. A new approach to image copy detection based on extended feature sets . In Proceedings of the IEEE International Conference on Image Processing , Vol. 3 , 664--666. R. Venkatesan, S.-M. Koon, M. H. Akubowski, and P. Moulin. 2000. A new approach to image copy detection based on extended feature sets. In Proceedings of the IEEE International Conference on Image Processing, Vol. 3, 664--666."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873601"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2485163"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855414"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190594"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2038637"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2171698"},{"key":"e_1_2_1_8_1","first-page":"2022","article-title":"Asymmetric binary coding for image search","volume":"19","author":"Shen F.","year":"2017","unstructured":"F. Shen , Y. Yang , L. Liu , W. Liu , and D. Tao . 2017 . Asymmetric binary coding for image search . Asymm. Bin. Cod. Image Search 19 , 9 (2017), 2022 -- 2032 . F. Shen, Y. Yang, L. Liu, W. Liu, and D. Tao. 2017. Asymmetric binary coding for image search. Asymm. Bin. Cod. Image Search 19, 9 (2017), 2022--2032.","journal-title":"Asymm. Bin. Cod. Image Search"},{"key":"e_1_2_1_9_1","unstructured":"A. Menezes V. Oorschot and S. Vanstone. 1998. Handbook of Applied Cryptography. CRC Press 683--683.  A. Menezes V. Oorschot and S. Vanstone. 1998. Handbook of Applied Cryptography. CRC Press 683--683."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-010-9458-9"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.897258"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.45"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.05.024"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2407698"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152126"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240136.2240141"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352012.1352014"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.07.006"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.09.060"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.02.008"},{"volume-title":"Proceedings of the IEEE International Symposium on Intelligent Signal Processing and Communication Systems. 595--598","author":"Ou Y.","key":"e_1_2_1_21_1","unstructured":"Y. Ou and K. H. Rhee . 2009. A key-dependent secure image hashing scheme by using Radon transform . In Proceedings of the IEEE International Symposium on Intelligent Signal Processing and Communication Systems. 595--598 . Y. Ou and K. H. Rhee. 2009. A key-dependent secure image hashing scheme by using Radon transform. In Proceedings of the IEEE International Symposium on Intelligent Signal Processing and Communication Systems. 595--598."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2016.03.010"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the IEEE International Conference on Image Processing","volume":"5","author":"Kozat S. S.","unstructured":"S. S. Kozat , R. Venkatesan , and M. K. Mihcak . 2004. Robust perceptual image hashing via matrix invariants . In Proceedings of the IEEE International Conference on Image Processing , Vol. 5 , 3443--3446. S. S. Kozat, R. Venkatesan, and M. K. Mihcak. 2004. Robust perceptual image hashing via matrix invariants. In Proceedings of the IEEE International Conference on Image Processing, Vol. 5, 3443--3446."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902670"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2496-6"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2837745"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223680"},{"volume-title":"Proceedings of the European Signal Processing Conference. 299--302","author":"Lefebvre F.","key":"e_1_2_1_28_1","unstructured":"F. Lefebvre , B. Macq , and J. D. Legat . 2002. RASH: Radon soft hash algorithm . In Proceedings of the European Signal Processing Conference. 299--302 . F. Lefebvre, B. Macq, and J. D. Legat. 2002. RASH: Radon soft hash algorithm. In Proceedings of the European Signal Processing Conference. 299--302."},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the International Conference on Communications and Multimedia Security","volume":"7025","author":"Nguyen D.","unstructured":"D. Nguyen , W. Li , and B. Preneel . 2011. Radon transform-based secure image hashing . In Proceedings of the International Conference on Communications and Multimedia Security , Vol. 7025 , 186--193. D. Nguyen, W. Li, and B. Preneel. 2011. Radon transform-based secure image hashing. In Proceedings of the International Conference on Communications and Multimedia Security, Vol. 7025, 186--193."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.13164\/re.2016.0556"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the International Conference on Image Processing","volume":"1","author":"Wolberg G.","unstructured":"G. Wolberg and S. Zokai . 2002. Robust image registration using log-polar transform . In Proceedings of the International Conference on Image Processing , Vol. 1 , 493--496. G. Wolberg and S. Zokai. 2002. Robust image registration using log-polar transform. In Proceedings of the International Conference on Image Processing, Vol. 1, 493--496."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2015.05.002"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2703636"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.142"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2013.0332"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.905982"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2014.05.015"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.04.057"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2594136"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2873820.2873867"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/859859"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2814344"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.03.021"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2729896"},{"volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence. 1230--1236","author":"Kang W.","key":"e_1_2_1_45_1","unstructured":"W. Kang , W. Li , and Z. Zhou . 2016. Column sampling based discrete supervised hashing . In Proceedings of the AAAI Conference on Artificial Intelligence. 1230--1236 . W. Kang, W. Li, and Z. Zhou. 2016. Column sampling based discrete supervised hashing. In Proceedings of the AAAI Conference on Artificial Intelligence. 1230--1236."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2749159"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2611485"},{"volume-title":"Proceedings of the ACM International Conference on Multimedia. 1522--1530","author":"Shen F.","key":"e_1_2_1_48_1","unstructured":"F. Shen , X. Gao , L. Liu , Y. Yang , and H. Shen . 2017. Deep asymmetric pairwise hashing . In Proceedings of the ACM International Conference on Multimedia. 1522--1530 . F. Shen, X. Gao, L. Liu, Y. Yang, and H. Shen. 2017. Deep asymmetric pairwise hashing. In Proceedings of the ACM International Conference on Multimedia. 1522--1530."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2821921"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2016.1200500"},{"key":"e_1_2_1_51_1","unstructured":"R. C. Gonzalez and R. E. Woods. 2007. Digital Image Processing (3rd ed.). Prentice Hall.  R. C. Gonzalez and R. E. Woods. 2007. Digital Image Processing (3rd ed.). Prentice Hall."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057692"},{"key":"e_1_2_1_53_1","unstructured":"Usc-Sipi Image Database. Retrieved from: http:\/\/sipi.usc.edu\/database\/.  Usc-Sipi Image Database. Retrieved from: http:\/\/sipi.usc.edu\/database\/."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.235"},{"key":"e_1_2_1_55_1","unstructured":"Ground Truth Database. Retrieved from: http:\/\/www.cs.washington.edu\/reseach\/Imagedatabase\/groundtruth\/.  Ground Truth Database. Retrieved from: http:\/\/www.cs.washington.edu\/reseach\/Imagedatabase\/groundtruth\/."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/79.879339"},{"volume-title":"Proceedings of the IEEE Trustcom\/BigDataSE\/ISPA Conference. 14--18","author":"Huang X.","key":"e_1_2_1_57_1","unstructured":"X. Huang , X. Liu , G. Wang , and M. Su . 2016. A robust image hashing with enhanced randomness by using random walk on zigzag blocking . In Proceedings of the IEEE Trustcom\/BigDataSE\/ISPA Conference. 14--18 . X. Huang, X. Liu, G. Wang, and M. Su. 2016. A robust image hashing with enhanced randomness by using random walk on zigzag blocking. In Proceedings of the IEEE Trustcom\/BigDataSE\/ISPA Conference. 14--18."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007990050026"},{"volume-title":"Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval. 11--18","author":"Turpin A.","key":"e_1_2_1_59_1","unstructured":"A. Turpin and F. Scholer . 2006. User performance versus precision measures for simple search tasks . In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval. 11--18 . A. Turpin and F. Scholer. 2006. User performance versus precision measures for simple search tasks. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval. 11--18."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2601065"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.900099"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2011.75"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/79.939835"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(02)00130-3"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.101"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355394","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3355394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:34Z","timestamp":1750202614000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355394"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,30]]},"references-count":65,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,11,30]]}},"alternative-id":["10.1145\/3355394"],"URL":"https:\/\/doi.org\/10.1145\/3355394","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2019,11,30]]},"assertion":[{"value":"2019-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}