Cloud Space Optimization by Preventing Similar Image Insertion Using Hashing Based on Feature Point

  • Authors

    • Radhika Nambiar
    • Prithvi A
    • Priyanka A
    • Suma M Shirahatti
    • Prof. Radhakrishna Dodmane
    2018-12-13
    https://doi.org/10.14419/ijet.v7i4.39.28358
  • A-Hash, D-hash, P-hash, Feature extraction, DCT, MSER, Correlation coefficient factor etc.
  • Abstract

    People tend to click a lot of pictures in their phones or they download images from the internet. When these images are uploaded to cloud, there is high possibility of similar images being already present which were uploaded earlier. This leads to the wastage of space and related issues. For efficient utilization of cloud space, the proposed system provides a framework to determine duplicate images in the cloud. The duplicate images are determined using hash value as a key parameter. The hash values of the image are generated using perceptual image hashing algorithms. Since these algorithms are geometric transformation variant, the proposed system is developed based on feature extraction and image hashing. This will ensure more accuracy. The system is compared with existing algorithm based on accuracy and the results are shown.

     

     

  • References

    1. [1] Herbert Bay, Tinne Tuytelaars, and Luc Van Gool, “SURF: Speeded Up Robust Featuresâ€, Computer Vision and Image Understanding 110,pp 346–359, 2008

      [2] Vishal Monga, Arindam Banerjee, and Brian L. Evans, “A Clustering Based Approach to Perceptual Image Hashingâ€, IEEE Trans. on Information Forensics and Security, pp 68-97, 21 Feb 2006

      [3] MengjuanFei, ZhaojieJu, Xiantong Zhen, Jing Li, “Real-time Visual Tracking Based on Improved Perceptual Hashingâ€, vol 76, Issue 3, pp 4617-4634, Feb 2017,

      [4] Vipul Bajaj, Sanket Keluskar, Ravi Jaisawala and Prof .Rupali Sawantb,“Plagiarism Detection of Imagesâ€, International Journal of Innovative and Emerging Research in Engineering, vol 2, Issue 2, pp 140-144, 2015

      [5] Google books [Online].Available: https://books.google.co.in/books?id=vchMDwAAQBAJ&pg=PA1291& lpg=PA1291&dq=hash+algorithm+not+suitable+for+rotated+images&s ource=bl&ots=ZBmKUR8ue4&sig=aRtMnGo3YstHGvp5Q8IXGrrVL AA&hl=en&sa=X&ved=0ahUKEwi01uudxt_ZAhVKuo8KHf3ZBv4Q6 AEIbzAM#v=onepage&q=hash%20algorithm%20not%20suitable%20f or%20rotated%20images&f=false

      [6] Sam Farisa Chaerul Haviana and Dedy Kurniadi, “Average Hashing for Perceptual Image Similarity in Mobile Phone Applicationâ€, Journal of Telematics and Informatics (JTI),Vol.4, No.1, pp. 12-18, March 2016.

      [7] MatLab website [Online].Available: https://www.mathworks.com/discovery/feature-extraction.html

      [8] Google books [Online].Available: https://books.google.co.in/books?id=6ElXDQAAQBAJ&printsec=front cover#v=onepage&q=Interest%20point%20detector&f=false

      [9] Longjiang Yu and Shenghe Sun, “Image Robust Hashing based on DCT Signâ€, IEEE, 26 December 2006,

      [10] Wikipedia [Online].Available:https://en.wikipedia.org/wiki/Cryptographic_hash_fu nction

      [11] Harald Baier, Frank Breitinger , “Security Aspects of Piecewise Hashing in Computer Forensicsâ€, IEEE, 27 June 2011

      [12] Ashwin Swaminathan, “Robust and Secure Image Hashing,â€, IEEE, 17 September 2007

      [13] Francisco Vega, Jose Medina , Daniel Mendoza, Vıctor Saquicela, and Mauricio Espinoza, “A Robust Video Identification Framework using Perceptual Image Hashingâ€, IEEE, 21 December 2017

      [14] HackerFactor Website [Online].Available:http://www.hackerfactor.com/blog/index.php?/archiv es/529-Kind-of-Like-That.html

      [15] Andrea Drmic, Marin Silic, Goran Delac, Klemo Vladimir, Adrian S.

      [16] Kurdija, “Evaluating Robustness of Perceptual Image Hashing Algorithmsâ€, MIPRO 2017, May 22- 26, 2017.

      [17] [Online].Available:https://www.d2dcrc.com.au/blog/perceptual-hashing-of-images/

      [18] Xudong Lv and Z. Jane Wang, “Shape Context based Image Hashing using local feature pointsâ€, IEEE, 2011.

      [19] Xudong Lv, Robust, “Digital Image Hashing Algorithms for Image Identificationâ€, University of British Columbia, 2013.

      [20] MatLab website [Online].Available: https://in.mathworks.com/help/images/ref/dct2.html

  • Downloads

  • How to Cite

    Nambiar, R., A, P., A, P., M Shirahatti, S., & Radhakrishna Dodmane, P. (2018). Cloud Space Optimization by Preventing Similar Image Insertion Using Hashing Based on Feature Point. International Journal of Engineering & Technology, 7(4.39), 1042-1046. https://doi.org/10.14419/ijet.v7i4.39.28358

    Received date: 2019-03-14

    Accepted date: 2019-03-14

    Published date: 2018-12-13