Discovery of Tampered Image with Robust Hashing

被引:0
作者
Tang, Zhenjun [1 ,2 ]
Yu, Junwei [2 ]
Zhang, Xianquan [1 ,2 ]
Zhang, Shichao [1 ,2 ,3 ]
机构
[1] Guangxi Normal Univ, Guangxi Key Lab Multi Source Informat Min & Secur, Guilin 541004, Peoples R China
[2] Guangxi Normal Univ, Dept Comp Sci, Guilin 541004, Peoples R China
[3] Univ Technol Sydney, Fac Informat Technol, Sydney, NSW 2007, Australia
来源
ADVANCED DATA MINING AND APPLICATIONS, ADMA 2014 | 2014年 / 8933卷
关键词
Robust hashing; image hashing; invariant moment; tampering discovery; SECURE; SCHEME;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Tampered image discovery from similar images is a challenging problem of multimedia security. Aiming at this issue, we propose a robust image hashing with invariant moments. Specifically, the proposed hashing firstly converts the input image into a normalized image by interpolation, filtering and color space conversion. Then it divides the normalized image into overlapping blocks and extracts invariant moments of blocks to form a feature matrix. Finally, the feature matrix is compressed to make a short hash. Hash similarity is determined by measuring similarity between hash segments with correlation coefficient. Experimental results indicate that our hashing is robust against normal digital operations and can efficiently distinguish tampered images from similar images. Comparisons show that our hashing is better than some notable hashing algorithms in classification performances between robustness and content sensitivity.
引用
收藏
页码:112 / 122
页数:11
相关论文
共 25 条
  • [1] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    [J]. SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [2] Fridrich J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P178, DOI 10.1109/ITCC.2000.844203
  • [3] TEMPLATE MATCHING IN ROTATED IMAGES
    GOSHTASBY, A
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1985, 7 (03) : 338 - 344
  • [4] HSIA TC, 1981, IEEE T SYST MAN CYB, V11, P831
  • [5] VISUAL-PATTERN RECOGNITION BY MOMENT INVARIANTS
    HU, M
    [J]. IRE TRANSACTIONS ON INFORMATION THEORY, 1962, 8 (02): : 179 - &
  • [6] COMPRESSIVE SENSING-BASED IMAGE HASHING
    Kang, Li-Wei
    Lu, Chun-Shien
    Hsu, Chao-Yung
    [J]. 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 1285 - 1288
  • [7] Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization
    Li, Yuenan
    Lu, Zheming
    Zhu, Ce
    Niu, Xiamu
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (04) : 1963 - 1980
  • [8] A robust image authentication method distinguishing JPEG compression from malicious manipulation
    Lin, CY
    Chang, SF
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) : 153 - 168
  • [9] MULTIMEDIA FORENSIC HASH BASED ON VISUAL WORDS
    Lu, Wenjun
    Wu, Min
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, : 989 - 992
  • [10] REDUCED-REFERENCE IMAGE QUALITY ASSESSMENT BASED ON PERCEPTUAL IMAGE HASHING
    Lv, Xudong
    Wang, Z. Jane
    [J]. 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 4361 - 4364