Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation

被引:4
作者
Guerrini, Fabrizio [1 ]
Dalai, Marco [1 ]
Leonardi, Riccardo [1 ]
机构
[1] Univ Brescia CNIT, Dept Informat Engn, I-25123 Brescia, Italy
关键词
Image registration; Cryptography; Bandwidth; Forensics; Information security; Source coding; Phase spectrum; secure communication; Fourier-Mellin transform; rigid image registration; distributed source coding; image hashing; REGISTRATION; ROBUST;
D O I
10.1109/TIFS.2020.2990793
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Signal processing applications dealing with secure transmission are enjoying increasing attention lately. This paper provides some theoretical insights as well as a practical solution for transmitting a hash of an image to a central server to be compared with a reference image. The proposed solution employs a rigid image registration technique viewed in a distributed source coding perspective. In essence, it embodies a phase encoding framework to let the decoder estimate the transformation parameters using a very modest amount of information about the original image. The problem is first cast in an ideal setting and then it is solved in a realistic scenario, giving more prominence to low computational complexity in both the transmitter and receiver, minimal hash size, and hash security. Satisfactory experimental results are reported on a standard images set.
引用
收藏
页码:3482 / 3496
页数:15
相关论文
共 42 条
[1]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[2]  
[Anonymous], BR J RADIOL S2
[3]  
Baluja S, 2007, INT CONF ACOUST SPEE, P213
[4]   Speeded-Up Robust Features (SURF) [J].
Bay, Herbert ;
Ess, Andreas ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) :346-359
[5]   Shape matching and object recognition using shape contexts [J].
Belongie, S ;
Malik, J ;
Puzicha, J .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2002, 24 (04) :509-522
[6]   Blind camera fingerprinting and image clustering [J].
Bloy, Greg J. .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2008, 30 (03) :532-U1
[7]   A SURVEY OF IMAGE REGISTRATION TECHNIQUES [J].
BROWN, LG .
COMPUTING SURVEYS, 1992, 24 (04) :325-376
[8]   An introduction to compressive sampling: A sensing/sampling paradigm that goes against the common knowledge in data acquisition [J].
Candes, Emmanuel J. ;
Wakin, Michael B. .
IEEE Signal Processing Magazine, 2008, 25 (02) :21-30
[9]   Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications [J].
Chen, Chenglong ;
Ni, Jiangqun ;
Shen, Zhaoyi ;
Shi, Yun Qing .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017, 26 (06) :2811-2824
[10]  
CHEN QS, 1994, IEEE T PATTERN ANAL, V16, P1156