Robust and secure perceptual image hashing in the transform domain
نویسنده
چکیده
The rapid development of multimedia devices such as computers, network technologies, and cell phones have made it easier for users to create, broadcast, convey, share, store, and distribute multimedia data including images, videos and audio files on a daily basis. However, the availability of image processing software in the public domain has facilitated illegal copying and distribution of digital images with unnoticeable quality changes. Thus, security and identification of media content has become an important and demanding area for research. Perceptual hashing is one of the recent technologies used for multimedia content security. A perceptual image hash function is a hash function that is robust against content-preserving operations (CPOs), such as noise, JPEG lossy compression and rotation. This aim of this research is to study and investigate existing techniques and then contribute to the development of new perceptual image hashing techniques in the transform domain for image identification and copy detection applications. The design requirements for any perceptual image hashing system are robustness, discriminative capability (uniqueness), and unpredictability (security). The feature extraction stage plays a key role in ensuring the system output is robust and discriminative. This thesis mainly focuses on the robust feature extraction stage and the analysis of the proposed system’s security. The following contributions have been made: A new perceptual hashing technique using pseudo-random sub-images in the discrete wavelet transform (DWT) domain for extracting features has been developed. The idea employs a recent dimension reduction technique, referred to as non-negative matrix factorization (NMF) in the literature, for enhancing the robustness and security of the hash. This approach is proposed to select the most stable coefficients under various content-preserving operations, compact. The robust image hashes are generated by applies DWT and NMF into image. The proposed sub-images-DWT technique has been shown to yield good performance under image processing operations, but it still suffers from geometric attacks. A new rotation-invariant FMT-based hashing technique incorporating the Fourier-
منابع مشابه
Image authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملA Robust Image Denoising Technique in the Contourlet Transform Domain
The contourlet transform has the benefit of efficiently capturing the oriented geometrical structures of images. In this paper, by incorporating the ideas of Stein’s Unbiased Risk Estimator (SURE) approach in Nonsubsampled Contourlet Transform (NSCT) domain, a new image denoising technique is devised. We utilize the characteristics of NSCT coefficients in high and low subbands and apply SURE sh...
متن کاملA robust and secure perceptual hashing system based on a quantization step analysis
Perceptual hashing is conventionally used for content identification and authentication. It has applications in database content search, watermarking and image retrieval. Most countermeasures proposed in the literature generally focus on the feature extraction stage to get robust features to authenticate the image, but few studies address the perceptual hashing security achieved by a cryptograp...
متن کاملCompressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کاملIntelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014