Image Distortion Estimation by Hash Comparison
نویسندگان
چکیده
Perceptual hashing is conventionally used for content identification and authentication. In this work, we explore a new application of image hashing techniques. By comparing the hash values of original images and their compressed versions, we are able to estimate the distortion level. A particular image hash algorithm is proposed for this application. The distortion level is measured by the signal to noise ratio (SNR). It is estimated from the bit error rate (BER) of hash values. The estimation performance is evaluated by experiments. The JPEG, JPEG2000 compression, and additive white Gaussian noise are considered. We show that a theoretical model does not work well in practice. In order to improve estimation accuracy, we introduce a correction term in the theoretical model. We find that the correction term is highly correlated to the BER and the uncorrected SNR. Therefore it can be predicted using a linear model. A new estimation procedure is defined accordingly. New experiment results are much improved.
منابع مشابه
Compressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کاملRobust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack
Digital watermarking provides a feasible way for copyright protection of multimedia. The major disadvantage of the existing methods is their poor resistance to both extensive geometric distortions and watermark-estimation attack (WEA). In view of this fact, our goal of this paper is to propose a robust image watermarking scheme that can withstand geometric distortions and WEA. Our scheme is mai...
متن کاملOptimizedhybrid Securitymechanism for Image Authentication and Secrecy Using Pso
Authentication is one of the image security issues solved by hash function and another one issue is providing security for illegal manipulation of digital image is solved by an encryption. An optimized hybrid image security mechanism for authentication and secrecy of images by means of Particle Swarm Optimization (PSO) in daubechies4 transform is illustrated in this paper. This mechanism provid...
متن کاملLocal Content Based Image Authentication for Tamper Localization
Digital images make up a large component in the multimedia information. Hence Image authentication has attained a great importance and lead to the development of several image authentication algorithms. This paper proposes a block based watermarking scheme for image authentication based on the edge information extracted from each block. A signature is calculated from each edge block of the imag...
متن کاملEffect of Phase-Encoding Reduction on Geometric Distortion and BOLD Signal Changes in fMRI
Introduction Echo-planar imaging (EPI) is a group of fast data acquisition methods commonly used in fMRI studies. It acquires multiple image lines in k-space after a single excitation, which leads to a very short scan time. A well-known problem with EPI is that it is more sensitive to distortions due to the used encoding scheme. Source of distortion is inhomogeneity in the static B0 field that ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011