Next Article in Journal
Efficient Rank-Based Diffusion Process with Assured Convergence
Previous Article in Journal
Detecting and Locating Passive Video Forgery Based on Low Computational Complexity Third-Order Tensor Representation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification

1
Department of Mechanical Engineering, FEUP—Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal
2
INEGI—Institute of Science and Innovation in Mechanical and Industrial Engineering, 4200-465 Porto, Portugal
3
Department of Electrical and Computer Engineering, FEUP—Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal
4
INESC TEC—INESC Technology and Science (formerly INESC Porto), 4200-465 Porto, Portugal
*
Authors to whom correspondence should be addressed.
Current address: Rua Dr. Roberto Frias, s/n, 4200-465 Porto, Portugal.
Submission received: 29 December 2020 / Revised: 27 February 2021 / Accepted: 1 March 2021 / Published: 8 March 2021

Abstract

:
Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. This authentication process relies on the comparison between a user’s cork image and all registered cork images in the database of genuine items. With the growth of the database, this one-to-many comparison method becomes lengthier and therefore usefulness decreases. To tackle this problem, the present work designs and compares hashing-assisted image matching methods that can be used in cork stopper authentication. The analyzed approaches are the discrete cosine transform, wavelet transform, Radon transform, and other methods such as difference hash and average hash. The most successful approach uses a 1024-bit hash length and difference hash method providing a 98% accuracy rate. By transforming the image matching into a hash matching problem, the approach presented becomes almost 40 times faster when compared to the literature.

1. Introduction

The concept of Fingerprint of Things stems from an increasing trend towards the storage and analysis of a large amount of data [1]. This data is usually related to the manufacturing process and use of a given the object, creating a detailed history to which it can be attributed. This information can be very useful regarding possible improvements in production processes or quality control [1,2,3,4,5].
It is often referred to as a possible solution in the fight against the counterfeiting of goods [3]. Regarding this point, one of the most pressing issues concerns the counterfeiting of medicines and other medical products. According to the World Health Organization (WHO) [6,7], this is a considerable problem and one which has increased in both dimension and implication, with a negative impact at the economic and social level, as well as raising health concerns, both for individuals and the public. As an example, the WHO mentions, on this point and by way of example, the contribution of this type of fraud to an increase antimicrobial resistance.
The unique identification of these products and the storage of a maximum of information associated with them, have emerged as a possible solution to this problem. This leads to a direct link between the manufacturer and the consumer that ideally would not be interrupted by entities with malicious motives and would thus serve as a guarantee of the product’s reliability and quality. For this purpose, some methods have already been put into practice such as bar codes, Quick Response (QR) codes, Radio-Frequency IDentification (RFID) tags, Near Field Communication (NFC) technology, and even serial numbers, among others. However, they do not constitute fully functional options, not only because they can be easily manipulated and cloned but also because, in their vast majority, they identify the packaging instead of the product itself [8,9,10].
Although these are steps towards solving the problems presented, they raise a series of issues, regarding safety and cost [1]:
  • They can undergo several tampering attempts such as interception of communication, data corruption, forgery, and cloning.
  • Systems as simple as serial numbers or bar codes are quite simple to forge or reproduce.
  • Small components produced in large quantities, such as screws, would be made more expensive by the insertion, in each of them, of an RFID or NFC tag or other identification object. For even smaller components, it may be impossible to incorporate any type of identifier.
  • The combination of label materials with those of the component could lead to obstacles at recycling.
As a way to respond to these challenges, the new Fingerprint of Things systems has emerged. It does not require direct contact with the object to identify it, thus constituting a non-invasive procedure. Moreover, the fact that it does not require any type of tag or sensor, relying exclusively on specific characteristics of the object as a way of detection, provides a solution to most of the issues which were raised earlier. In addition, since it includes hardly any type of additional processing or information attached to the product, it can be quickly coupled to a production line, requiring only a station that collects the elements relevant of the product and stores them in a database.
A question now arises. What kind of objects can this method identify? In this regard, it is important to refer to the concept of Physical Unclonability and Disorder (PUD). PUD [11] security systems use randomness in the distribution of certain physical characteristics of an object to identify it, and can be divided into two categories: UNique Objects [10] (UNOs) and Physical Unclonable Functions (PUFs) [10,12,13].
UNOs are physical objects with unique and measurable characteristics that must be difficult, if not impossible, to clone, given the great randomness of the system. Furthermore, these systems must be robust as to preserve those characteristics in the face of normal conditions of use and ageing for relatively long periods of time. PUFs are constituted by physical systems that are subject to certain stimuli. In view of these stimuli, the PUF must generate a unique response. PUF must be unpredictable and unidirectional [14].
It has been proved that cork stoppers are unique objects [10] with characteristics that allow their classification as UNOs. Costa et al. [15] suggested a method based on clustering and matching images with the Recognition of Individual Objects using Tagless Approaches (RIOTA) algorithm. The proposed implementation and its use of key point descriptors lead to a considerable computational cost involved in matching descriptors from the two images to compare, resulting in impractical search times. This issue is to be addressed in the present work, in which possible methodological solutions are suggested and tested. Some concern was also expressed regarding the influence of image quality in detecting correct matches. Image quality is affected by noise, rotation, cropping, scaling, and illumination. Among these, rotation is presumed to be one of the main problems and is tackled as well.
The proposed work aims to find an alternative solution for the authentication of cork stopper representations, using hash codes instead of images. Therefore, it does as follows:
  • allows for the reduction in noise and non-relevant data at an early stage of the process;
  • tests and compares a set of hashing methods and image-processing techniques for the treatment of cork stopper images;
  • proposes the optimized design for the cork stopper authentication process.
This paper is structured as follows: the state-of-the-art, image hashing method developments in the literature are reviewed and classified; in the background of concepts section, some known methods about image processing and data compressing is discussed; the tests performed on the methods for obtaining the correspondent success rate are described in the methodology section; in the results and discussion section, data regarding the performance of the proposed method is analyzed, highlighting the most promising results. Lastly, some final remarks are made in the conclusion and future works section.

2. Background of Concepts

This section briefly introduces the main concepts needed throughout the rest of the paper. Some image processing and object recognition concepts are discussed, such as Discrete Cosine Transform (DCT), Local Linear Embedding (LLE), and Discrete Wavelet Transform (DWT). For the image pre-processing, Gaussian filters, contrast stretching, cork stopper outline detection for cropping, and bicubic interpolation on rescaling are mentioned. Moreover, due to the need for image rotation correction, some methods such as Radon Transform (RT) and Hough Transform (HT) are discussed.

2.1. Bicubic Interpolation on Rescaling

Knowing that the images are presented with different sizes, and as it is necessary to compare them to each other, they must be rescaled to a standard, common size. In this work, the value chosen for their size was 512 × 512 pixels, which also coincides with the maximum image size among the images available in the database. For this rescaling, pixels have to be added by means of interpolation. In order to create a smooth transition from one pixel to another, the intensity of interpolated pixels is calculated based on a cubic interpolation of the values of its neighbors.

2.2. Gaussian Filter

Linear filtering, such as that obtained with Gaussian filters, is commonly implemented in computer vision to reduce noise, especially Gaussian filters. In a linear filter, each pixel value is obtained from a linear combination of the intensity values of its neighboring pixels, as seen in Equation (1).
L i , j = 1 N   k , l I i + k , j + l · H k , l ,
where L i , j are the intensities of each individual pixel. For Gaussian filters, the coefficients of the Gaussian filter H k , l are obtained from Equation (2).
H k , l = 1 2 π σ e 1 2 σ 2 k 2 + l 2

2.3. Cropping

For a better evaluation of the hamming distance between the images, their background, which may differ from image to image, needs to be removed. For this, the color histogram is calculated, and the correct brightness value for the identification of the pixels that correspond to the edges is determined. Knowing that there is no guarantee that the pixels identified as the edge of the cork stopper representation are immediately adjacent, an interpolation between a sample of boundary pixels, which are known to be correctly identified, was performed. The radius value is also limited so that the segmentation is correct (Figure 1). By applying the least square method, the center coordinates C x C , y C and the radius R, values are obtained, thus assigning a null value to the pixels outside the condition shown in Equation (3).
x x c 2 + y y c 2 < R 2

2.4. Contrast Stretching

The images can be presented with varying brightness depending on the device used in their collection and considering the necessity of comparing them among each other. Therefore, a normalization may be performed. This is done by mapping the values in a low contrast image, for example, to the full length of the [0 to 255] interval, which can be seen in Figure 2.

2.5. Discrete Cosine Transform (DCT)

DCT is a method for compression and decompression of an image based on the value of its pixels [16,17,18], transforming it into a sequence of relevant data points. The relevance of these data points is evaluated in terms of the sum of cosine functions with different frequencies. As DCT is more accurate in small images, it is common practice to divide the processed image in N blocks of a b × b size. After this division, the DCT maps the pixel values in those blocks from the spatial domain to the frequency domain [19]. Mathematically, the transformation results from Equation (4),
C i u , v   =   a u , v N · j = 0 b 1 k = 0 b 1 B i j , k · cos 2 j + 1 u π 2 b · cos 2 k + 1 v π 2 b
where B i j , k is the intensity value of the pixel with coordinates (j,k) in the block with index I = 1,…, N and a u , v is defined in Equation (5).
a u , v   =   2 , u , v 0 1 , u , v = 0
Then, the first M values, where M can vary from 1 to N, are retrieved from a zig-zag sequence. This ensures data compression, as each b × b matrix has been converted into a vector of dimension M. These N vectors are then combined into a single M × N matrix.

2.6. Local Linear Embedding (LLE)

To obtain a hash with N-bit as a final result, it is necessary to perform data compression using an efficient method such as local linear embedding [20], an alternative to principal component analysis and multidimensional scaling, which were reported by Tang et al. [21]. This method is performed by first looking for K clusters of points computed from a matrix M × N. These points are normalized and organized according to the minimum distances between them and this is achieved by using a weight matrix. Following this, the eigenvectors are obtained from the weight matrix and a new matrix d × N is attained. In comparison with the initial M × N matrix, the new matrix is more compact.

2.7. Discrete Wavelet Transform (DWT)

A wavelet transform is a transformation that projects a given signal into the frequency- and time-domain whose basis functions are scaled and shifted versions of a wavelet. The discrete wavelet transform (DWT) is no more than the implementation of such wavelet transform resorting to a discrete set of the wavelet scales and translations. Therefore, the similarity between the DCT and the DWT is easily recognized. The main difference lies in the fact that the DCT relies on cosine functions of unlimited duration instead of short-duration transient functions (wavelets) for the set of basic functions [22]. Consequently, the DWT performs better extraction of information from high-frequency components which in the case of images corresponds to edges. This was thought to be of importance given the non-smooth characteristics of cork images. For the sake of differentiating the two transforms it may also be added that the DWT provides high resolution in both the time- and frequency-domain, while the DCT only presents high resolution in the frequency-domain [23]. The DWT is also widely used in image processing for compression [24,25] and noise removal [22].
In general terms, the wavelet transform is expressed by Equation (6),
Ψ s Ψ τ , s   =   1 s x t Ψ * t τ s d t
where * refers to the complex conjugate and the function Ψ is the transforming function (mother wavelet). The transformed signal is a function of τ and s, corresponding, respectively, to the translation and scale factors.

2.8. Difference Hash (DH)

Difference hash is an alternative method to DCT and DWT. In DH, the input image is converted to a 2D grayscale image, downsized to N × N. A row hash is produced with either 1 or 0 values depending on whether pixel intensity is increasing or decreasing from pixel to pixel in the direction of increasing column index. A similar process is done for each column, resulting in a final hash size of 2 × N2.

2.9. Average Hash (AH)

Similar to DH, the average hash method takes the input image and converts it to grayscale and the image is downsized to N × N. The average intensity of all pixels on the image is then calculated and each pixel is compared to that average value. Following this, depending on whether each pixel has above- or below-average intensity, the final hash is produced.

2.10. Radon Transform (RT)

The Radon transform is a technique that allows features within the image to be detected [26] by computing the total density of a function f along a given line S ( ρ , θ ) [27]. In Equation (7), the Radon transform is defined.
R f ρ , θ =   + f x s , y s d s =   + f ρ · cos θ s · sin θ ,   ρ · sin θ + s · cos θ d s
This transform has been found to be useful in object and pattern recognition applications [28,29] because, apart from being a lossless transform (meaning information can be accurately reconstructed), it is a transform used for mapping a set of coordinates in the spatial domain to a Radon (parametric) domain. Even more relevant regarding the present work are its properties concerning rotation and scaling transformations [30]. Regarding this, Figure 3 shows how finding the relevant points in a sinogram determines the direction of the image.

2.11. Hough Transform (HT)

HT and RT are very similar [31]. For the present work, they both could have been used with the purpose of finding image orientation. However, while Radon transform finds the global image orientation looking for different perspectives, Hough transform is built to find straight lines based on certain features, even in the presence of noise [31]. The versatility of HT was shown by works such as [32], which has applied it in arbitrary curve analysis.
To detect these features, the conversion from the spatial domain to the parametric domain is done, and a sinogram is obtained. This sinogram (Figure 4) exhibits brighter regions, each of which identifies a dominant direction in the image. These regions of interest (local maxima) are then evaluated by the average and variance values, which are used to characterize, respectively, an approximate value for the rotated angle and the reliability of that approximation.
In the presence of angular data ( a 1 , , a n ) , the mean M and variation V are determined by Equations (8)–(12).
C p = i = 1 n cos a i
S p = i = 1 n sin a i
ρ = C p 2 + S p 2 , T p = tan 1 S p C p
M = T p , C p > 0   S p > 0 T p + π , C p < 0 T p + 2 π , C p > 0   S p < 0
V = 1 ρ n

2.12. Hamming Distance

The hamming distance can be interpreted as a norm-1 distance, as seen in Equation (13).
V W 1 = i = 1 n v i w i
V and W are now denoted as binary vectors. This distance is commonly interpreted as being the sum of the serial results of the exclusiveness between v i and w i , which means that the sum of v i w i , i = 1,…, n.
In this work, Hamming distance is used to compare two different hashes at a time.

3. State of the Art

In this section, the latest developments in image hashing are reviewed.
For image hashing codes generation, various state-of-the-art image hashing methods have been proposed over the last decade. Du et al. [33] defined five types of image hashing methods: invariant feature transform-based methods, local feature points-based method, dimension reduction-based method, statistics features-based methods, and learning-based methods. For invariant feature-related methods, the robustness and major feature extraction are main advantages of this kind of methods. For instance, in order to do hash size reduction based on big blocks in block-based analysis, Yan et al. [34] performed a binary approach to accomplish both the smallest block size and more compact hash, using a Quaternion lowpass filter. Qin et al. [35] used a combination of color feature and local texture extraction, making this a hybrid approach, using Weber local binary pattern. Local feature points methods have the advantage of defining compression in the same way mainly for rotated and non-rotated images, using invariant scalar approaches, which ensure that features are preserved even under image processing. Qin et al. [36] developed a method to attribute a final hash using color vector angle, and it was shown that it is secure even after quantizing and scrambling. Pun et al. [37] designed a method for tampering detection using progressive feature point selection, which filters the key points as opposed to the Scale-Invariant Feature Transform (SIFT) method, and better detects the tamper feature. Dimension reduction-based methods are also compression methods, the difference being that they reduce the dimensional space into a lower one, based on the significance of each dimension. Examples for these are LLE, Singular Value Decomposition (SVD), and Fast Johnson-Lindenstrauss Transform (FJLT). These methods have been successfully applied and improved. For instance, Sun et al. [38] proposed a method based on Fourier-Mellin transform to improve performance under pre-processing (which can be included in local feature points-based methods category) and dimension reduction, using statistic structure and sparse coefficients of wavelet to assure efficiency. Liu et al. [39] tried to do image recovery performance for image authentication and tampering identification. For that, the authors used low-rank representation for obtaining both feature and error matrices and compressive sensing for the obtention of primary features. By having lower error values, this method showed better results than similar hashing methods. Statistics feature-based methods rely on statistic parameters such as mean, variance, or histogram to perform extraction of image features, which are used not only for tackling noise, blur, and distortions but especially for verification of uniqueness of image hashes. Srivastava et al. [40] proposed a robust method for conversion of images into hash codes in the presence of multiple types of attacks, mainly rotation, using color space conversion, Radon transform, and DCT, followed by evaluation thought four statistic parameters mean, standard deviation, skewness, and kurtosis. Huang et al. [41] proposed a method using two different types of features, using DCT coefficients for local features and texture for global features. Here, statistical characteristics were extracted to improve perceptual robustness. At last, learning-based methods use training data in order to tune the algorithm, usually neural networks, for better performing of image authentication tasks. Jiang et al. [42] used deep Convolutional Neural Networks (CNNs) in order to do content authentication. Through data training, image feature matrix was evaluated as the output of neural networks. The results of this paper show that discrimination behavior is better than other methods and robustness is shown to be acceptable. According to Du et al. [33], and despite the need for training data and time computational costs, the learning methods are better in terms of accuracy. Moreover, it can be verified that DCT and Radon transform are two of the most used approaches for image authentication, since a wide range of works use this method and have obtained good results.

4. Methodology

The current methodology is based on the implementation of methods taken from the referenced literature in the background of concepts section. Following the implementation, the obtained results were evaluated and, when necessary, improvements were made considering the specifications of the application.
The entire process, from image acquisition to image matching, can be observed in the theoretical framework, seen in Figure 5. The input image is put through pre-processing, Radon transform, hashing conversion, and is finally compared with the DB (hashes from original and cloned images). A more detailed view of the image-to-hash conversion steps is shown in Figure 5. After retrieving the image, its pre-processing is accomplished by the following sequence of steps: rescaling (Section 2.1), Gaussian filter (Section 2.2), contrast stretching (Section 2.4), and cropping (Section 2.3). Then, as a first step towards rotation correction, Radon transform is applied and a matrix regarding the outputted sinogram is obtained. For each discretized angle, an average of the projection of the pre-processed image along the radius axis is calculated, by means of the Root Mean Square (RMS); the discretized angle for which RMS value is the maximum value is taken to be the correct rotation angle. The rotation is corrected in the pre-processing of the image and then, finally, a hash method converts the image to a codified form.
Since generated hash codes are strongly influenced by rotation, the performance of different rotation measurement and correction algorithms was previously evaluated. Due to the promising results, Radon transform was chosen over Hough transform. Further details on rotation influence and rotation algorithms are shown in the Results section.
However, RT, by itself, was insufficient. RT can rotate an image to the main direction, with no distinction between the two possible solutions (0° and 180°); this concern was minimized with the addition of rotated image duplicates to the database.
The following hash functions were then tested: average hash, wavelet hash, difference hash, and perceptual hash. The wavelet hash code was obtained from the application of DWT, while the perceptual hash code was produced by the application of DCT. Moreover, the method used by Tang et al. [21] (DCT + LLE) was tested using the following adaptations: the steps concerning hash code security were discarded (given the unclonability of cork features); further, the final step in LLE (Section 2.6), low-dimensional embedding vector calculation, was performed numerically with the initialization matrix 1.
The hash codes were obtained with a 256-bits size, with further investigation on hash code size influence. For this purpose, 64- and 1024-bits hash codes were also created. In the results section, time costs for this process will be detailed for the different hashing methods.
For evaluation purposes, a database (DB) [10] was used containing images taken with a phone camera (Sony Z3X1, Tokyo, Japan) and two test sets (TS1 and TS2) containing images taken with two other different cameras (Asus Zenfone 5,Taipei, Taiwan, and Sony PlayStation Eye, respectively). In these tests, each DB hash was compared to every hash in both TS1 and TS2, with the similarity between each hash pair being evaluated by the correspondent hamming distance (HD). The number of pairs for which the HD was lower than the correct match was tallied. This information is taken as a measure of the performance of the matching method. Obviously, a perfect result would translate to no pairs having a smaller HD than the correct pair, i.e., the correct match being associated with the minimum HD.
It is also important to mention that there are two types of corks: agglomerated and natural [43]. Database A is a set of 300 images of the agglomerated type of corks, and databases E and N are sets with 100 images each of the natural type. This difference is portrayed in Figure 6. The distinction between such types of corks is of the utmost importance when designing the image processing method, especially when it comes to rotation correction. In the results section, only the natural type is discussed, due to the complexity of the image correction problem for agglomerated corks.

5. Results and Discussion

The results for the applied correspondence methods are presented in this section: firstly, a comparison of images is done without any pre-processing or previous rotation correction; thus, these corrections are considered; in the last subsection, time performance of these methodologies is addressed, with further discussion.
As mentioned in the methodologies, there are several steps that are sequentially used. It is important to evaluate how influential each one of those steps is on the final success rates. In an initial approach, a study was performed in order to assess the importance of the application of Radon transform to correct the rotation of cork images. The parameter values adopted are listed and associated with the corresponding methods (identified in Section 2) in Table 1.
DCT + LLE, LLE parameters have been proven to have a relevant role in matching accuracy, as evidenced by Figure A1 and Figure A2 in Appendix A. In these figures, scatter plots are presented, in which LLE parameters k and dmax vary according to the different perspectives of evaluation. It is important to minimize hamming distance (HD) of the correct match and increase the value of HD for non-homonymous images, in order to decrease the number of false positives returned by the method. With these objectives in mind, the values for these parameters were made to vary between 42 and 242, with an increment of 20, for 20 images extracted from the database (giving 60 possible homonymous pairs). The lowest limit of the variation interval (42) was chosen because it was found to be close to the lowest possible value for these parameters that still allows for information about the image to be preserved. From the plots, it is concluded that the pair (k, dmax) that fits the best performance would be (202,222). Further evaluation of these effects (with smaller increments in parameter variation) should be addressed in future works.
To analyze the efficiency of the methods composed by the hash function, Radon transform, and 180° rotation duplicates, three hash test sets were considered. The different test sets are useful for identifying the influence of each stage of the method on its success rate. These hash test sets are as follows:
  • S1: Hash codes from all images in the database
  • S2: Hash codes from images successfully rotated by RT (0° or 180°)
  • S3: Hash codes from images successfully rotated by RT to the correct side (0°)
Note that S2 and S3 are smaller than S1. More precisely, their sizes are 85% and 25.5% of S1, respectively.
The percentage of images for which the correct match falls within top 1, top 5, top and Top 10 (also called success rate) was obtained for each hash test set and for each hash function. The top 5 and top 10 results are of interest, given the expectation of higher success rates than those achieved by the top 1 research while also considerably reducing the search space, allowing for algorithms, such as the one presented by [10] to be applied in a timely manner. They display the values of the minimum success rates between both TS1 and TS2 when matched with the DB, for a specific case and method. These top 1, top 5, and top 10 results are presented in Table A1, Table A2, Table A3, Table A4, Table A5, Table A6, Table A7, Table A8, Table A9 and Table A10 (in Appendix B). Due to the need for comparison between image sets that have different sizes, in which case relative values are more suitable, relative measurements were preferred for the accumulative graphic plots presented throughout this section. These plots were obtained in order to show the accumulative number of correct matches achieved as the Top X criteria grows larger and less strict (i.e., X increases).
This section is structured as follows: Section 5.1 shows the results obtained using the adopted and adapted hashing method without any rotation correction; Section 5.2 shows the results for different tries on rotation correction; Section 5.3 refers to the results concerning image rotation correction and contrast stretching and its effect on the previously implemented hashing algorithm for the different sets of images S1, S2, and S3; in Section 5.4, time performance values are displayed for different methods and different sets.

5.1. Testing Methods without Pre-Processing

In a first approach, the performed tests were mainly concerned with the distribution of HD between image pairs. These pairs can be made up of homonymous images or non-homonymous images. Homonymous images are defined as images representing the same cork stopper but photographed with different cell phone cameras. The name “homonymous” was chosen because photograph files of the same cork stopper appear with the same label in the database. The value of HD was also evaluated for various non-homonymous pairs. The algorithm assumes the correct match to be that with the minimum HD; therefore, it was essential to know how many wrong matches had a lower HD than the correct one. Ideally, the expected value for this distribution would be very close to 0, which would mean, in most cases, the homonymous image would also be the image with the minimum HD value. Since this is not the case, considering the high number of images with the value of HD below the value of the homonymous image, the cause of this observation was sought.
It is mentioned by [21] that the hamming distance values might be influenced by image rotation. Thus, this hypothesis was tested. An initial test was carried out on a set of 47 images from the same image pack used by the authors [37], and the variation of HD with the angle of rotation was plotted. As can be seen in Figure 7, the results are similar to those presented in that work.
At a later stage, the method was applied to the database to extend the conclusions already drawn, now showing the sensitivity to the rotation for the images of the stoppers. It is possible to verify, in Figure 7, that, although the values of hamming distance tend to decrease with the decrease of the rotation angle, the “linearity” is not so visible. It must be noted that both the values and the variation of these values are much lower than those seen in that work, therefore, the referred discrepancy can be justified by this behavior. The differences between the two plots can be explained by the fact that all the images in the cork database are very similar to each other, which was not the case for the database used in the aforementioned study.
At this point, the limitations of implementing this method for the cork database were identified and it was confirmed that hash codes are sensitive to rotation, especially in images such as the ones being studied (cork stoppers).
It was also noticed that some images have characteristics that allow for rotation angle determination, such as type E and N corks, which show natural lines in the same direction. After correcting rotation, the adopted method can be successfully applied.

General Results and Comparison for the Different Methods

The results displayed in Figure 8 are obtained when retrieving 64-bits hash codes using the DCT + LLE method but for adequate comparison with the results presented in Section 5.3, 256-bits hash codes were generated.
Figure 8 is subdivided into three different bars for each hash method, related to the different sets, already mentioned (S1, S2, S3). In this stage, the RT was not applied. The main goal was to obtain the influence of the size of the sets. As observed in the accumulative graphic plots, this influence was not significant since all curves increased in a similar manner. Note that the percentage of accuracy was expected to be apparently better for S3, which was the smallest set among those considered, because the number of images considered for any Top X was independent of the size of the respective set. For Top 1, DH was the method that better performs, but only about 5% in 300 images are correctly matched. AH was the worst method in the tests.
These poor results, displayed in Figure 8a, were indicative of the need for corrective action in the pre-processing stage, i.e., rotation correction and contrast stretching.

5.2. Rotation Correction

5.2.1. Rotation Correction Using Hough Transform Operation

Given the already referred similarity between Hough transform and Radon transform, and the fact that they are commonly associated to each other in a wide range of works, some test were run to evaluate the performance of HT for the rotation correction of the stopper cork images.
By implementing HT, the results shown in Figure 9 are consistent with the expected behavior, although these were not promising. It was shown in Section 5.1 that a deviation of less than 1° is acceptable; thus, it can be observed that the deviation value (μ = −9.8022; σ = 25.6619) obtained with HT implementation is not sufficiently accurate.

5.2.2. Rotation Correction Using Radon Transform

With the implementation of Radon transform, results, displayed in Figure 10, are shown to be better when compared to those in the previous analysis. The dHash was found to be the method that performs more accurately, with almost 30% of correct matches for Top1 of S1, against almost 5% in the case where RT was not applied. Notwithstanding, 30% is still not significantly accurate, which calls for the search of a better approach, such as the equalization of image colors.

5.3. Contrast Stretching and Hash sizes

Figure 11 shows the results for datasets with hashes from original and duplicated images. The values are higher for S2 and S3 results, suggesting that Radon transform and 180° rotation duplicates have a significant influence on matching success. Moreover, pHash and DH were the best methods in the scope of this study. The top 5 and top 10 of S3 with DH method resulted in the best success rate, with 98.0% of correct matches.
WHash and DCT + LLE methods are generally worse than the latter methods; still, wHash can be used as an alternative to pHash and DH, since in some cases, for example, in top 10 of S1, the matching success rates are similar. AH has been promptly identified as the worst method among those studied.
Regarding hash size, it is possible to conclude that the 1024-bit hashes provide higher accuracy, although the use of 256-bit hash codes leads to similar results. Increasing the hash size even further to 4096-bit would be worse, as the value of accuracy would fall to 19.5% for S1, for example. This is due to an increase in sensitivity to noise.

5.4. Time Performance

One of the main focuses of the present work was, in addition to the correction for rotation effects, to decrease the time cost of search operations, as suggested by [10]. Thus, an evaluation of the time performance of each of the proposed methods is essential.
In order to observe the differences in time costs between the different steps of the algorithm, it was divided into 5 main steps:
  • Step 1: Image acquisition
  • Step 2: Pre-processing (Gauss filter, contrast stretching, cubic interpolation)
  • Step 3: Radon transform and angle calculation
  • Step 4: Image-to-hash conversion
  • Step 5: Hamming distance and final correspondence
The values for estimated time performance can be seen in Table 2 and Table 3, for a computer with processor Intel® Celeron® N4000 CPU @ 1.10 GHz, Windows 10 Operative System and 4 GB RAM. In Table 2, distributions of time (average—μ, standard deviation—σ) are displayed for Steps 1–3 and 5 and in Table 3 for Step 4, different methods used and hash different sizes.
It is possible to conclude that Radon transform is the step of the algorithm that takes longer to execute, with almost 8 s required per image. This suggests that the other times are reduced in comparison. It is likely that vectorial computations greatly reduce this time. Sample testing using MATLAB 2020b, where RT is vectorially performed hints at a more than tenfold performance improvement. These preliminary results came from a 64-bit Windows 10 SO with processor Intel® Core™ i7-10510U CPU @ 1.80GHz 2.30 GHz, achieving an RT run time of μ , σ   =     0.1579 ,   0.0103 s on MATLAB 2020b against μ , σ   =   1.7786 ,   0.0247 (s) for Python 3.7 with this same hardware were approximately 11.3 times smaller. Concerning Step 4, DCT + LLE seems to be the worst method when it comes to time performance, for the same reason that was pointed out for the RT step, i.e., the non-vectorial form. DH seems to be the fastest method; however, apart from the DCT + LLE, all methods were relatively fast. When compared to the literature [44], this work seems to be a faster way of obtaining correspondence, requiring 0.241 ms for comparison of 100 HD when compared to more than 9 ms occurred in work [44]. The times were measured on the same computer and, as such, the mentioned values are comparable. The values in Table 4 show that the present approach is almost 40× faster than that work.

6. Conclusions and Future Work

Hash codes have been successfully used for efficient natural cork stoppers image matching, being of paramount importance in cork stopper authentication for anticounterfeiting purposes.
The proposed approach is centered on Radon transform to correct image rotation and allow the generation of meaningful image hashes that later can be used for image comparison. The best result was obtained using a hash size of 1024-bit and DH, achieving a success rate of 98% for a top 10 approach and taking only 2.41 μs per match, which was much better than [44]. This result demonstrates that the proposed approach is valuable for the mentioned case study of natural cork image comparison; this approach is likely to be useful for any image with a dominant direction.
Since the agglomerated corks do not possess the directionality needed for the RT to operate, the development of rotation correction methods is still necessary. Future research might involve the approach proposed in [45,46] regarding isotropic or rotation invariant textures.

Author Contributions

Data curation, R.F. and B.R.; methodology, R.F. and B.R.; project administration, V.C. and A.S.; resources, V.C. and A.S.; supervision, V.C. and A.S.; writing—original draft, R.F. and B.R.; writing—review and editing, R.F., B.R., V.C., and A.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

This article was financed by national funds through FCT (Fundação para a Ciência e a Tecnologia, I.P.) within the scope of the project with reference UIDB/50022/2020. This work was partially financed by national funds through the Portuguese funding agency, FCT (Fundação para a Ciência e a Tecnologia) within project UIDB/50014/2020. The authors gratefully acknowledge the funding of project POCI-01-0145-FEDER-032460 (GRIS: grain refinement induced by electromagnetic stirring: Development of a Predictive Approach for Co-Cr Medical Implants, co-financed by Programa Operacional Competitividade e Internacionalização (COMPETE 2020), through Fundo Europeu de Desenvolvimento Regional (FEDER) and by national funds through FCT.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Figure A1. Number of correct matches (per 60 possible pairs) depending on the LLE parameter variation and the difference between minimum value and value for homonymous images.
Figure A1. Number of correct matches (per 60 possible pairs) depending on the LLE parameter variation and the difference between minimum value and value for homonymous images.
Jimaging 07 00048 g0a1
Figure A2. Number of correct matches (per 60 possible pairs) depending on the LLE parameter variation and the number of tested images with lower values of HD in relation to homonymous images.
Figure A2. Number of correct matches (per 60 possible pairs) depending on the LLE parameter variation and the number of tested images with lower values of HD in relation to homonymous images.
Jimaging 07 00048 g0a2

Appendix B. Tables of Accuracy Results

Table A1. Correct matches results for database vs. TS1 comparison—without Radon transform or contrast stretching application (256-bit).
Table A1. Correct matches results for database vs. TS1 comparison—without Radon transform or contrast stretching application (256-bit).
DCT + LLEpHashaHashdHashwHash
S1Top 16.8%6.5%1.3%5.0%0.8%
Top 512.3%10.8%3.3%14.8%4.3%
Top 1016.0%12.3%5.0%21.0%9.3%
S2Top 18.5%7.1%1.2%6.2%1.2%
Top 513.8%11.5%4.1%17.4%5.9%
Top 1020.3%14.7%5.0%23.5%10.0%
S3Top 111.8%7.8%2.9%3.9%5.9%
Top 523.5%13.7%7.8%19.6%18.6%
Top 1030.4%20.6%12.7%25.5%31.4%
Table A2. Correct matches results for database vs. TS2 comparison—without Radon transform or contrast stretching application (256-bit).
Table A2. Correct matches results for database vs. TS2 comparison—without Radon transform or contrast stretching application (256-bit).
DCT + LLEpHashaHashdHashwHash
S1Top 13.8%1.5%0.0%4.8%3.8%
Top 57.3%4.0%2.5%11.3%9.0%
Top 1011.0%5.5%4.3%17.0%10.8%
S2Top 14.1%1.5%0.0%5.0%4.1%
Top 58.5%3.8%2.9%10.9%8.8%
Top 1012.6%7.4%5.0%15.3%11.5%
S3Top 15.9%2.9%2.9%12.7%11.8%
Top 522.5%13.7%9.8%24.5%22.5%
Top 1035.3%22.5%20.6%37.3%35.3%
Table A3. Correct matches results for Database vs TS1 comparison—with Radon transform or without contrast stretching application (256-bit).
Table A3. Correct matches results for Database vs TS1 comparison—with Radon transform or without contrast stretching application (256-bit).
DCT + LLEpHashaHashdHashwHash
S1Top 15.3%21.8%9.0%31.8%9.3%
Top 513.3%30.0%14.8%43.3%15.0%
Top 1019.0%33.5%19.0%49.3%19.8%
S2Top 17.9%25.3%10.9%37.6%10.6%
Top 517.4%35.0%18.2%48.5%18.8%
Top 1025.0%38.8%21.8%55.0%24.7%
S3Top 115.7%35.3%17.6%47.1%19.6%
Top 540.2%45.1%33.3%59.8%33.3%
Top 1050.0%51.0%42.2%62.7%47.1%
Table A4. Correct matches results for Database vs TS2 comparison—with Radon transform or without contrast stretching application (256-bit).
Table A4. Correct matches results for Database vs TS2 comparison—with Radon transform or without contrast stretching application (256-bit).
DCT + LLEpHashaHashdHashwHash
S1Top 115.8%45.3%12.8%62.8%15.3%
Top 530.3%54.8%16.8%74.3%25.5%
Top 1037.8%61.8%20.3%77.3%31.5%
S2Top 120.6%53.8%15.6%72.4%17.9%
Top 537.9%66.2%20.9%84.7%30.9%
Top 1048.2%72.9%24.7%87.9%37.1%
S3Top 133.3%72.5%18.6%88.2%32.4%
Top 552.9%85.3%29.4%93.1%53.9%
Top 1067.6%87.3%39.2%96.1%61.8%
Table A5. Correct matches results for database vs. TS1 comparison—64 bits.
Table A5. Correct matches results for database vs. TS1 comparison—64 bits.
DCT + LLEpHashaHashdHashwHash
S1Top 13.3%16.5%1.3%9.3%15.5%
Top 511.5%28.8%3.5%21.5%27.5%
Top 1017.8%37.5%6.3%29.0%37.3%
S2Top 13.8%20.0%1.8%10.9%17.9%
Top 514.1%35.0%4.7%25.3%32.1%
Top 1020.3%45.0%7.9%34.4%43.5%
S3Top 17.8%33.3%2.9%18.6%20.6%
Top 517.6%48.0%10.8%40.2%42.2%
Top 1035.3%65.7%13.7%52.0%52.9%
Table A6. Correct matches results for database vs. TS2 comparison—64 bits.
Table A6. Correct matches results for database vs. TS2 comparison—64 bits.
DCT + LLEpHashaHashdHashwHash
S1Top 12.8%15.0%1.0%9.5%9.0%
Top 57.5%28.8%4.0%22.0%25.3%
Top 1012.3%36.8%7.5%27.3%33.8%
S2Top 14.1%19.1%1.8%9.1%10.3%
Top 510.0%33.5%5.3%24.7%30.3%
Top 1014.4%39.4%10.6%29.1%39.7%
S3Top 17.8%36.3%4.9%24.5%23.5%
Top 527.5%58.8%13.7%45.1%48.0%
Top 1032.4%73.5%24.5%66.7%58.8%
Table A7. Correct matches results for database vs. TS1 comparison—256 bits.
Table A7. Correct matches results for database vs. TS1 comparison—256 bits.
DCT+LLEpHashaHashdHashwHash
S1Top 148.5%78.8%17.8%73.5%65.0%
Top 567.0%84.0%28.5%81.5%77.0%
Top 1073.0%84.8%34.5%84.3%80.8%
S2Top 157.6%90.3%12.4%84.1%75.0%
Top 576.2%95.3%21.5%92.6%88.2%
Top 1082.4%96.5%27.1%94.7%91.8%
S3Top 170.6%92.2%25.5%90.2%78.4%
Top 587.3%95.1%45.1%93.1%90.2%
Top 1091.2%96.1%57.8%98.0%95.1%
Table A8. Correct matches results for database vs. TS2 comparison—256 bits.
Table A8. Correct matches results for database vs. TS2 comparison—256 bits.
DCT + LLEpHashaHashdHashwHash
S1Top 145.0%78.8%22.5%76.5%68.3%
Top 564.3%84.0%32.5%86.5%79.3%
Top 1072.5%85.0%37.3%86.8%82.3%
S2Top 152.1%88.8%16.8%87.1%77.6%
Top 573.5%93.5%22.4%96.2%88.5%
Top 1082.9%95.0%27.9%96.5%92.4%
S3Top 163.7%96.1%34.3%93.1%84.3%
Top 586.3%98.0%50.0%96.1%94.1%
Top 1094.1%98.0%60.8%96.1%96.1%
Table A9. Correct matches results for database vs. TS1 comparison—1024 bits.
Table A9. Correct matches results for database vs. TS1 comparison—1024 bits.
DCT + LLEpHashaHashdHashwHash
S1Top 10.5%85.3%51.8%85.0%82.0%
Top 50.5%85.8%63.8%86.3%85.0%
Top 107.0%86.5%69.8%87.0%85.3%
S2Top 10.6%97.1%59.4%96.5%93.2%
Top 50.6%97.4%73.8%98.2%96.8%
Top 108.2%97.9%80.0%98.5%97.1%
S3Top 15.4%93.1%65.7%98.0%90.2%
Top 514.3%96.1%82.4%98.0%95.1%
Top 1021.4%97.1%86.3%98.0%96.1%
Table A10. Correct matches results for database vs. TS2 comparison—1024 bits.
Table A10. Correct matches results for database vs. TS2 comparison—1024 bits.
DCT + LLEpHashaHashdHashwHash
S1Top 10.3%83.8%51.3%82.8%82.3%
Top 50.5%85.5%64.5%84.0%86.5%
Top 100.5%86.3%70.0%85.5%87.5%
S2Top 10.3%93.5%57.4%92.1%92.4%
Top 50.6%94.7%73.8%93.5%96.5%
Top 100.9%95.3%80.9%94.7%97.1%
S3Top 10.0%96.1%76.5%94.1%91.2%
Top 50.0%96.1%84.3%96.1%96.1%
Top 100.0%96.1%88.2%98.0%96.1%

References

  1. Ishiyama, R.; Takahashi, T.; Kudo, Y. Individual recognition based on the fingerprint of things expands the applications of IoT. NEC Tech. J. 2016, 11, 1–5. [Google Scholar]
  2. Wigger, B.; Meissner, T.; Förste, A.; Jetter, V.; Zimmermann, A. Using unique surface patterns of injection moulded plastic components as an image based Physical Unclonable Function for secure component identification. Sci. Rep. 2018, 8, 4738. [Google Scholar] [CrossRef] [Green Version]
  3. Ishiyama, R.; Kudo, Y.; Takahashi, T.; Kooper, M.; Makino, K.; Abbink, D.; Nl, D. Medicine Tablet Authentication Using “Fingerprints” of Ink-Jet Printed Characters. In Proceedings of the 2019 IEEE International Conference on Industrial Technology (ICIT), Melbourne, VIC, Australia, 13–15 February 2019. [Google Scholar]
  4. Al-alem, F.; Alsmirat, M.A.; Al-Ayyoub, M. On the road to the Internet of Biometric Things: A survey of fingerprint acquisition technologies and fingerprint databases. In Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29 November–2 December 2016; pp. 1–6. [Google Scholar]
  5. Wang, X.; Gao, L.; Mao, S. CSI Phase Fingerprinting for Indoor Localization With a Deep Learning Approach. IEEE Internet Things J. 2016, 3, 1113–1123. [Google Scholar] [CrossRef]
  6. WHO. Global Surveillance and Monitoring System for Substandard and Falsified Medical Products; World Health Organization: Geneva, Switzerland, 2017; ISBN 978-92-4-151342-5. [Google Scholar]
  7. Behner, P.; Hecht, M.L.; Wahl, F. Fighting counterfeit pharmaceuticals: New defenses for an underestimated and growing menace. Retrieved Dec. 2017, 12, 2017. [Google Scholar]
  8. Juels, A. RFID security and privacy: A research survey. IEEE J. Sel. Areas Commun. 2006, 24, 381–394. [Google Scholar] [CrossRef]
  9. Chen, C.H.; Lin, I.C.; Yang, C.C. NFC Attacks Analysis and Survey. In Proceedings of the 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Birmingham, UK, 2–4 July 2014; pp. 458–462. [Google Scholar]
  10. Costa, V.; Sousa, A.; Reis, A. Cork as a Unique Object: Device, Method, and Evaluation. Appl. Sci. 2018, 8, 2150. [Google Scholar] [CrossRef] [Green Version]
  11. Rührmair, U.; Devadas, S.; Koushanfar, F. Security Based on Physical Unclonability and Disorder. In Introduction to Hardware Security and Trust; Springer: New York, NY, USA, 2012. [Google Scholar] [CrossRef]
  12. Pappu, R.; Recht, B.; Taylor, J.; Gershenfeld, N. Physical one-way functions. Science 2002, 297, 2026–2030. [Google Scholar] [CrossRef] [Green Version]
  13. Rührmair, U.; Holcomb, D.E. PUFs at a glance. In Proceedings of the 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany, 24–28 March 2014; pp. 1–6. [Google Scholar]
  14. Brzuska, C.; Fischlin, M.; Schröder, H.; Katzenbeisser, S. Physically Uncloneable Functions in the Universal Composition Framework BT—Advances in Cryptology—CRYPTO 2011; Rogaway, P., Ed.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 51–70. [Google Scholar]
  15. Costa, V.; Sousa, A.; Reis, A. Preventing wine counterfeiting by individual cork stopper recognition using image processing technologies. J. Imaging 2018, 4, 54. [Google Scholar] [CrossRef] [Green Version]
  16. Di Martino, F.; Loia, V.; Perfilieva, I.; Sessa, S. An image coding/decoding method based on direct and inverse fuzzy transforms. Int. J. Approx. Reason. 2008, 48, 110–131. [Google Scholar] [CrossRef] [Green Version]
  17. Gupta, M.; Kumar Garg, D. Analysis of Image Compression Algorithm Using DCT. Int. J. Eng. Res. Appl. 2012, 2, 515–521. [Google Scholar]
  18. Ito, I. A New Pseudo-Spectral Method Using the Discrete Cosine Transform. J. Imaging 2020, 6, 15. [Google Scholar] [CrossRef] [Green Version]
  19. Robinson, J.; Kecman, V. Combining support vector machine learning with the discrete cosine transform in image compression. IEEE Trans. Neural Netw. 2003, 14, 950–958. [Google Scholar] [CrossRef]
  20. Ridder, D.; Duin, R. Locally Linear Embedding For Classification. In Artificial Neural Networks and Neural Information Processing—ICANN/ICONIP 2003; Springer: Berlin/Heidelberg, Germany, 2003. [Google Scholar]
  21. Tang, Z.; Lao, H.; Zhang, X.; Liu, K. Robust image hashing via DCT and LLE. Comput. Secur. 2016, 62, 133–148. [Google Scholar] [CrossRef]
  22. Xizhi, Z. The Application of Wavelet Transform in Digital Image Processing. In Proceedings of the 2008 International Conference on MultiMedia and Information Technology, Three Gorges, China, 30–31 December 2008; pp. 326–329. [Google Scholar]
  23. Ramos, R.; Valdez-Salas, B.; Zlatev, R.; Schorr Wiener, M.; Bastidas Rull, J.M. The Discrete Wavelet Transform and Its Application for Noise Removal in Localized Corrosion Measurements. Int. J. Corros. 2017, 2017, 7925404. [Google Scholar] [CrossRef] [Green Version]
  24. Xiong, Z.; Ramchandran, K. Chapter 18—Wavelet Image Compression. In The Essential Guide to Image Processing; Bovik, A., Ed.; Academic Press: Boston, MA, USA, 2009; pp. 463–493. ISBN 978-0-12-374457-9. [Google Scholar]
  25. Kehtarnavaz, N. Chapter 7—Frequency Domain Processing. In Digital Signal Processing System Design, 2nd ed.; Kehtarnavaz, N., Ed.; Academic Press: Burlington, VT, USA, 2008; pp. 175–196. ISBN 978-0-12-374490-6. [Google Scholar]
  26. Dargham, J.A.; Chekima, A.; Moung, E.; Omatu, S. Radon transform for face recognition. Artif. Life Robot. 2010, 15, 359–362. [Google Scholar] [CrossRef]
  27. Beatty, J. The Radon Transform and Medical Imaging; CBMS-NSF Regional Conference Series in Applied Mathematics; SIAM: Philadelphia, PA, USA, 2014. [Google Scholar]
  28. Lefbvre, F.; Macq, B.; Legat, J.-D. Rash: Radon soft hash algorithm. In Proceedings of the 2002 11th European Signal Processing Conference, Toulouse, France, 3–6 September 2002; Volume 1. [Google Scholar]
  29. Ou, Y.; Rhee, K.H. A key-dependent secure image hashing scheme by using Radon transform. In Proceedings of the 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Kanazawa, Japan, 7–9 January 2009; pp. 595–598. [Google Scholar]
  30. Santosh, K.C.; Lamiroy, B.; Wendling, L. DTW-radon-based shape descriptor for pattern recognition. Int. J. Pattern Recognit. Artif. Intell. 2013, 27, 1350008. [Google Scholar] [CrossRef] [Green Version]
  31. Van Ginkel, M.; Luengo Hendriks, C.; Van Vliet, L. A Short Introduction to the Radon and Hough Transforms and How They Relate to Each Other; Delft University of Technology: Delft, The Netherlands, 2004. [Google Scholar]
  32. Bailey, D.; Chang, Y.; Le Moan, S. Analysing Arbitrary Curves from the Line Hough Transform. J. Imaging 2020, 6, 26. [Google Scholar] [CrossRef] [Green Version]
  33. Du, L.; Ho, A.T.S.; Cong, R. Perceptual hashing for image authentication: A survey. Signal Process. Image Commun. 2020, 81, 115713. [Google Scholar] [CrossRef]
  34. Yan, C.; Pun, C. Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2144–2158. [Google Scholar] [CrossRef]
  35. Qin, C.; Hu, Y.; Yao, H.; Duan, X.; Gao, L. Perceptual Image Hashing Based on Weber Local Binary Pattern and Color Angle Representation. IEEE Access 2019, 7, 45460–45471. [Google Scholar] [CrossRef]
  36. Qin, C.; Sun, M.; Chang, C.-C. Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process. 2018, 142, 194–205. [Google Scholar] [CrossRef]
  37. Pun, C.-M.; Yan, C.-P.; Yuan, X.-C. Robust image hashing using progressive feature selection for tampering detection. Multimed. Tools Appl. 2018, 77, 11609–11633. [Google Scholar] [CrossRef]
  38. Sun, R.; Zeng, W. Secure and robust image hashing via compressive sensing. Multimed. Tools Appl. 2014, 70, 1651–1665. [Google Scholar] [CrossRef]
  39. Liu, H.; Xiao, D.; Xiao, Y.; Zhang, Y. Robust image hashing with tampering recovery capability via low-rank and sparse representation. Multimed. Tools Appl. 2016, 75, 7681–7696. [Google Scholar] [CrossRef]
  40. Srivastava, M.; Siddiqui, J.; Ali, M.A. Robust image hashing based on statistical features for copy detection. In Proceedings of the 2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON), Varanasi, India, 9–11 December 2016; pp. 490–495. [Google Scholar]
  41. Huang, Z.; Liu, S. Robustness and Discrimination Oriented Hashing Combining Texture and Invariant Vector Distance. In Proceedings of the 26th ACM International Conference on Multimedia, Seoul, Korea, 22–26 October 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 1389–1397. [Google Scholar]
  42. Jiang, C.; Pang, Y. Perceptual image hashing based on a deep convolution neural network for content authentication. J. Electron. Imaging 2018, 27, 043055. [Google Scholar] [CrossRef]
  43. Costa, V. Vision Methods to Find Uniqueness Within a Class of Objects [University of Porto]. 2019. Available online: https://hdl.handle.net/10216/119624 (accessed on 5 March 2021).
  44. Costa, V.; Sousa, A.; Reis, A. CBIR for a wine anti-counterfeiting system using imagery from cork stoppers. In Proceedings of the 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), Cáceres, Spain, 13–16 June 2018; pp. 1–6. [Google Scholar]
  45. Jafari-Khouzani, K.; Soltanian-Zadeh, H. Radon transform orientation estimation for rotation invariant texture analysis. IEEE Trans. Pattern Anal. Mach. Intell. 2005, 27, 1004–1008. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  46. Hejazi, M.R.; Shevlyakov, G.; Ho, Y. Modified Discrete Radon Transforms and Their Application to Rotation-Invariant Image Analysis. In Proceedings of the 2006 IEEE Workshop on Multimedia Signal Processing, Victoria, BC, Canada, 3–6 October 2006; pp. 429–434. [Google Scholar]
Figure 1. Pre-processed image: (a) before the cropping operation; (b) after the cropping operation.
Figure 1. Pre-processed image: (a) before the cropping operation; (b) after the cropping operation.
Jimaging 07 00048 g001
Figure 2. Example of contrast stretching. Image and histogram: (a) without stretching; (b) with stretching.
Figure 2. Example of contrast stretching. Image and histogram: (a) without stretching; (b) with stretching.
Jimaging 07 00048 g002
Figure 3. (a) Image; (b) Radon Transform (RT) application.
Figure 3. (a) Image; (b) Radon Transform (RT) application.
Jimaging 07 00048 g003
Figure 4. Hough transform application after Canny edge detection.
Figure 4. Hough transform application after Canny edge detection.
Jimaging 07 00048 g004
Figure 5. Block diagram of the cork authentication process; proposed hash-based approach.
Figure 5. Block diagram of the cork authentication process; proposed hash-based approach.
Jimaging 07 00048 g005
Figure 6. Cork types: (a) natural; (b) agglomerated.
Figure 6. Cork types: (a) natural; (b) agglomerated.
Jimaging 07 00048 g006
Figure 7. Effect of rotation on hamming distance: (a) for a ‘non-cork’ database; (b) for a similar ‘non-cork’ database [21]; (c) for a cork database.
Figure 7. Effect of rotation on hamming distance: (a) for a ‘non-cork’ database; (b) for a similar ‘non-cork’ database [21]; (c) for a cork database.
Jimaging 07 00048 g007
Figure 8. Percentage of correct matches without the application of Radon transform nor contrast stretching: (a) for the worst cases between TS1 and TS2 comparisons and only for top 1, top 5, and top 10; (b) for the comparison with TS1, all rankings (in percentage); (c) for the comparison with TS2, all rankings (in percentage).
Figure 8. Percentage of correct matches without the application of Radon transform nor contrast stretching: (a) for the worst cases between TS1 and TS2 comparisons and only for top 1, top 5, and top 10; (b) for the comparison with TS1, all rankings (in percentage); (c) for the comparison with TS2, all rankings (in percentage).
Jimaging 07 00048 g008
Figure 9. Error obtained by the implementation of Hough transform.
Figure 9. Error obtained by the implementation of Hough transform.
Jimaging 07 00048 g009
Figure 10. Percentage of correct matches without application of contrast stretching: (a) for the worst cases between TS1 and TS2 comparisons and only for top 1, top 5, and top 10; (b) for the comparison with TS1, all rankings (in percentage); (c) for the comparison with TS2, all rankings (in percentage).
Figure 10. Percentage of correct matches without application of contrast stretching: (a) for the worst cases between TS1 and TS2 comparisons and only for top 1, top 5, and top 10; (b) for the comparison with TS1, all rankings (in percentage); (c) for the comparison with TS2, all rankings (in percentage).
Jimaging 07 00048 g010
Figure 11. Percentage of correct matches with Radon transform and contrast stretching: for the worst cases between TS1 and TS2 comparisons and only for top 1, top 5, top 10: (a) using S1; (b) using S2; (c) using S3; (d) for the comparison with TS1, all rankings (in percentage); (e) for the comparison with TS2, all rankings (in percentage).
Figure 11. Percentage of correct matches with Radon transform and contrast stretching: for the worst cases between TS1 and TS2 comparisons and only for top 1, top 5, top 10: (a) using S1; (b) using S2; (c) using S3; (d) for the comparison with TS1, all rankings (in percentage); (e) for the comparison with TS2, all rankings (in percentage).
Jimaging 07 00048 g011aJimaging 07 00048 g011b
Table 1. List of parameter values.
Table 1. List of parameter values.
Section 2Parameter DesignationValue
Section 2.1Image size512
Section 2.2Lowpass filtering window size3
Section 2.2Standard deviation8
Section 2.3Rad. Minimum limit value230
Section 2.3Rad. Maximum limit value260
Section 2.3Center min. Limit value230
Section 2.3Center max. Limit value280
Section 2.4Clip value0.03
Section 2.5B (N = 64-bit hash code)64
Section 2.5B (N = 256-bit hash code)32
Section 2.5B (N = 1024-bit hash code)16
Section 2.6K (N = 64-bit hash code)15
Section 2.6Dmax (N = 64-bit hash code)40
Section 2.6K (N = 256-bit hash code)42
Section 2.6Dmax (N = 256-bit hash code)42
Section 2.6K (N = 1024-bit hash code)400
Section 2.6Dmax (N = 1024-bit hash code)450
Table 2. Distribution of computational times for all steps excluding Step 4.
Table 2. Distribution of computational times for all steps excluding Step 4.
Step 1Step 2Step 3Step 5
μ (s)σ (s)μ (s)σ (s)μ (s)σ (s)μ (s)σ (s)
0.02430.01310.81780.07657.83820.41970.00350.0065
Table 3. Distribution of computational times for Step 4.
Table 3. Distribution of computational times for Step 4.
64-bit256-bit1024-bit
μ (s)σ (s)μ (s)σ (s)μ (s)σ (s)
pHash0.00790.02500.00760.01920.01130.0252
aHash0.00710.03770.01130.07320.00860.0156
wHash0.07740.02350.10100.04200.13300.6917
dHash0.00410.00570.00500.01080.00650.0055
DCT + LLE17.30901.972719.43060.5628274.311283.3862
Table 4. Comparing times for different works (equivalent to Step 5).
Table 4. Comparing times for different works (equivalent to Step 5).
MethodLiterature [44], CBIR (ms)Current Work, Hashing (ms)Ratio
Average of Comparing Time9.60.24139.83
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Fitas, R.; Rocha, B.; Costa, V.; Sousa, A. Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification. J. Imaging 2021, 7, 48. https://0-doi-org.brum.beds.ac.uk/10.3390/jimaging7030048

AMA Style

Fitas R, Rocha B, Costa V, Sousa A. Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification. Journal of Imaging. 2021; 7(3):48. https://0-doi-org.brum.beds.ac.uk/10.3390/jimaging7030048

Chicago/Turabian Style

Fitas, Ricardo, Bernardo Rocha, Valter Costa, and Armando Sousa. 2021. "Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification" Journal of Imaging 7, no. 3: 48. https://0-doi-org.brum.beds.ac.uk/10.3390/jimaging7030048

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop