Wave atom transform based image hashing using distributed source coding

被引:6
作者
Yang, Yanchao [1 ]
Zhou, Junwei [1 ]
Duan, Feipeng [1 ]
Liu, Fang [2 ]
Cheng, Lee-Ming [2 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci & Technol, Hubei Key Lab Transportat Internet Things, Wuhan, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Perceptual hashing; Image authentication; Distributed source coding; Wave atom transform; ROBUST; WATERMARKING;
D O I
10.1016/j.jisa.2016.09.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To reduce the size of hash code and enhance the security of wave atom transform (WAT) based image authentication system, a low-density parity-check code based distributed source coding (DSC) is employed to compress the hash code. With the help of a legitimately modified image, the compressed hash value could be correctly decoded while it will fail with the help of a maliciously attacked image. Therefore, the employed DSC provides a desired robustness to image authentication. Simulation results indicate that the proposed scheme provides a better performance with less hash code than existing WAT based image hash without using DSC. Moreover, the proposed scheme outperforms the random projection based approach in terms of authentication accuracy and data size. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:75 / 82
页数:8
相关论文
共 16 条
[1]   An efficient and secure robust watermarking scheme for document images using Integer wavelets and block coding of binary watermarks [J].
Chetan, K. R. ;
Nirmala, S. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 24-25 :13-24
[2]   Wave atoms and sparsity of oscillatory patterns [J].
Demanet, Laurent ;
Ying, Lexing .
APPLIED AND COMPUTATIONAL HARMONIC ANALYSIS, 2007, 23 (03) :368-387
[3]   Binomial transform based fragile watermarking for image authentication [J].
Ghosal, S. K. ;
Mandal, J. K. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (4-5) :272-281
[4]  
Kang LW, 2009, IEEE INT C IM PROC, P1277
[5]   Image Authentication Using Distributed Source Coding [J].
Lin, Yao-Chung ;
Varodayan, David ;
Girod, Bernd .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (01) :273-283
[6]   Wave atom transform generated strong image hashing scheme [J].
Liu, Fang ;
Cheng, Lee-Ming ;
Leung, Hon-Yin ;
Fu, Qi-Kai .
OPTICS COMMUNICATIONS, 2012, 285 (24) :5008-5018
[7]   Perceptual Image Hashing Based on Shape Contexts and Local Feature Points [J].
Lv, Xudong ;
Wang, Z. Jane .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :1081-1093
[8]   NOISELESS CODING OF CORRELATED INFORMATION SOURCES [J].
SLEPIAN, D ;
WOLF, JK .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1973, 19 (04) :471-480
[9]  
Sun QB, 2002, 2002 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II, PROCEEDINGS, P440
[10]   Robust and secure image hashing [J].
Swaminathan, Ashwin ;
Mao, Yinian ;
Wu, Min .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (02) :215-230