Detection of Structural Tampering in a Digital Image Using Canny Edge Detector

被引:0
作者
Mall, Vinod [1 ]
Roy, Anil K. [1 ]
Mitra, Suman K. [1 ]
Shukla, Shivanshu [1 ]
机构
[1] Dhirubhai Ambani Inst Informat & Commun Technol, Gandhinagar 382007, Gujarat, India
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) | 2013年
关键词
Image Tampering; Canny Edge Detector; Hash function; Gaussian filter; Digital Watermarking; Image compression; Content preserving manipulation; Tampering detection; Tampering localization; Similarity value; cryptographic digital signature; AUTHENTICATION; SIGNATURE; SECURE; ROBUST;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The verification of authenticity of digital images has become a challenging problem due to easy availability of image editing software which can also be used to tamper the images. Content based digital signature is being used by researchers for detecting malicious tampering operations. In the proposed scheme, Canny Edge Detector has been used to extract the feature vectors of the image through edge detection. This information is then used to generate a hash vector for tampering detection and localization. The suitable mathematical index has been developed to quantify the amount of tampering using the hash generated from digital content of the image.
引用
收藏
页数:7
相关论文
共 17 条
  • [1] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    [J]. SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [2] Bhattacharjee S, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P435, DOI 10.1109/ICIP.1998.723518
  • [4] Dharwadkar N. V., 2011, 2011 International Conference on Communications and Signal Processing (ICCSP), P489, DOI 10.1109/ICCSP.2011.5739368
  • [5] Fridrich J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P178, DOI 10.1109/ITCC.2000.844203
  • [6] Approximate message authentication codes for N-ary alphabets
    Ge, Renwei
    Arce, Gonzalo R.
    Di Creseenzo, Giovanni
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) : 56 - 67
  • [7] Perceptual Image Hashing Based on Virtual Watermark Detection
    Khelifi, Fouad
    Jiang, Jianmin
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2010, 19 (04) : 981 - 994
  • [8] Lefebvre F, 2003, 2003 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL 2, PROCEEDINGS, P495
  • [9] Fault resilient and compression tolerant digital signature for image authentication
    Lou, DC
    Liu, JL
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) : 31 - 39
  • [10] Structural digital signature for image authentication: An incidental distortion resistant scheme
    Lu, CS
    Liao, HYM
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (02) : 161 - 173