Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection

被引:26
作者
Tang, Zhenjun [1 ,2 ]
Wang, Shuozhong [1 ]
Zhang, Xinpeng [1 ]
Wei, Weimin [1 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200072, Peoples R China
[2] Guangxi Normal Univ, Dept Comp Sci, Guilin 541004, Peoples R China
关键词
image hashing; tampering detection; content-based image retrieval; structural feature; similarity metric; watermarking; ROBUST; WATERMARKING;
D O I
10.3233/FI-2011-377
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Structural image features are exploited to construct perceptual image hashes in this work. The image is first preprocessed and divided into overlapped blocks. Correlation between each image block and a reference pattern is calculated. The intermediate hash is obtained from the correlation coefficients. These coefficients are finally mapped to the interval [0, 100], and scrambled to generate the hash sequence. A key component of the hashing method is a specially defined similarity metric to measure the "distance" between hashes. This similarity metric is sensitive to visually unacceptable alterations in small regions of the image, enabling the detection of small area tampering in the image. The hash is robust against content-preserving processing such as JPEG compression, moderate noise contamination, watermark embedding, re-scaling, brightness and contrast adjustment, and low-pass filtering. It has very low collision probability. Experiments are conducted to show performance of the proposed method.
引用
收藏
页码:75 / 91
页数:17
相关论文
共 19 条
  • [1] [Anonymous], GROUND TRUTH DATABAS
  • [2] Fridrich J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P178, DOI 10.1109/ITCC.2000.844203
  • [3] Robust perceptual image hashing via matrix invariants
    Kozat, SS
    Venkatesan, R
    Mihçak, MK
    [J]. ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 3443 - 3446
  • [4] Lefebvre F, 2003, 2003 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL 2, PROCEEDINGS, P495
  • [5] Lefebvre F., 2002, P EUR SIGN PROC C, P299
  • [6] Lehmann EL., 2005, TESTING STAT HYPOTHE, P590
  • [7] ON THE SECURITY OF NON-FORGEABLE ROBUST HASH FUNCTIONS
    Li, Qiming
    Roy, Sujoy
    [J]. 2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 3124 - 3127
  • [8] A robust image authentication method distinguishing JPEG compression from malicious manipulation
    Lin, CY
    Chang, SF
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) : 153 - 168
  • [9] Unicity distance of robust image hashing
    Mao, Yinian
    Wu, Min
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (03) : 462 - 467
  • [10] MEIXNER A, 2004, P SPIE IS T SECURITY, P772