Geometrically Robust Image Hash with Tamper Detection and Location

نویسندگان

  • Yan WO
  • Guoqiang HAN
  • Bo ZHANG
  • Jin HAN
چکیده

Image hashing is an effective approach to image authentication. In this paper, a geometric distortioninvariant image hashing scheme, which can detect and locate the tampering, is proposed. The reported scheme performs Polar Complex Exponential Transform (PCET) on an image, and then the magnitudes and the phases of PCETs are combined to generate a set of rotation and scaling invariant features. To address the issue of security, the PCET moments are weighted by secret key K1 and permuted by secret key K2 respectively. Then the key-dependent transformed feature space is used to calculate the image hash. If the test image is verified as tampered image in the verification process, a map of the estimated tampering can be reconstructed from the image hashes to locate the tampering regions. Experimental results show that this scheme can tolerate almost all the typical image processing manipulations such as geometric distortion, JPEG compression, blurring, noise addition, and enhancement. Besides robustness, the proposed hashing scheme has the ability of detecting minute tampering with localization of the tampered area.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

A Novel Block-DCT and PCA Based Image Perceptual Hashing Algorithm

Image perceptual hashing finds applications in content indexing, large-scale image database management, certification and authentication and digital watermarking. We propose a Block-DCT and PCA based image perceptual hash in this article and explore the algorithm in the application of tamper detection. The main idea of the algorithm is to integrate color histogram and DCT coefficients of image ...

متن کامل

Detection of Coastline Using Satellite Image-Processing Technique

Extended abstract 1- Introduction  Coasts maintain their natural sustainability without human intervention and in spite of short-term changes, we are ultimately confronted with a coastal healthy environment, i.e. natural, rocky beaches, sandy beaches and so on. Today's use of remote sensing in most natural sciences is widespread. Due to the fact that fieldwork is costly and time-consuming, ...

متن کامل

Geometrically robust digital image watermarking using scale normalization and flowline curvature

The growth of internet communications, multimedia storage capacity, and software sophistication triggered the need to protect intellectual property in digital media. Digital watermark can be inserted into images for copyright protection, copy protection, tamper detection and authentication. Unfortunately, geometrical robustness in digital image watermarking remains a challenging issue because c...

متن کامل

Digital Watermarking for Image Tamper Detection using Block-Wise Technique

Fragile watermarking has the characteristics where the inserted watermark should be easily breakable for a trivial tampering of the image. So, fragile watermarking technique is proposed for the purpose of authentication or tamper detection. In this paper, we propose an efficient image tamper detection method using block-wise technique which is able to detect the tamper locations. In the propose...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014