Image authentication based on perceptual hash using Gabor filters

被引:11
作者
Wang, Lina [1 ,2 ]
Jiang, Xiaqiu [1 ]
Lian, Shiguo [3 ]
Hu, Donghui [1 ,4 ]
Ye, Dengpan [1 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
[2] Minist Educ, Key Lab Aerosp Informat Secur & Trust Comp, Wuhan 430072, Hubei, Peoples R China
[3] France Telecom R&D Beijing, HCI Lab, Beijing 100080, Peoples R China
[4] Hefei Univ Technol, Sch Comp Sci & Informat, Hefei 230009, Peoples R China
基金
中国国家自然科学基金;
关键词
Image authentication; Perceptual hash; Gabor filter; Reference metrics; ROBUST;
D O I
10.1007/s00500-009-0529-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Image authentication is an important topic in image forensics, which tells whether an image is tampered or not or even tells the tampered regions. To implement image authentication, image hash techniques have been reported recently. In this paper, we investigate existing image hash algorithms, and design an novel image hash based on human being's visual system. In this algorithm, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human's primary visual cortex. For a given image, we compute the reference scale, direction and block to make sure the final hash can resist against rotation, scale, and translation attacks while maintain the sensitivity to local malicious manipulations. In addition, it has another promising ability to locate the tampered image blocks, and approximately determining the type of tampering methods (delete, add, modify) and the original direction of each block. This ability is very useful in forensics. The experimental results show that the strategy of the reference metrics works quite well and our method is much more effective than the other state of art image hash methods. Moreover, our method can still locate the content-altering changes even undergo some content-preserving manipulations.
引用
收藏
页码:493 / 504
页数:12
相关论文
共 30 条
[1]  
[Anonymous], 2005, D WVL 7 1 SUMM REP F
[2]  
[Anonymous], P SPI EINTERNATIONAL
[3]  
[Anonymous], 2006, D WVL 11 BENCHM METR
[4]   End-stopped wavelets for detecting low-level features [J].
Bhattacharjee, SK ;
Vandergheynst, P .
WAVELET APPLICATIONS IN SIGNAL AND IMAGE PROCESSING VII, 1999, 3813 :732-741
[5]  
Cano P, 2002, PROCEEDINGS OF THE 2002 IEEE WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, P169
[6]   TWO-DIMENSIONAL SPECTRAL-ANALYSIS OF CORTICAL RECEPTIVE-FIELD PROFILES [J].
DAUGMAN, JG .
VISION RESEARCH, 1980, 20 (10) :847-856
[7]   SPATIAL-FREQUENCY SELECTIVITY OF CELLS IN MACAQUE VISUAL-CORTEX [J].
DEVALOIS, RL ;
ALBRECHT, DG ;
THORELL, LG .
VISION RESEARCH, 1982, 22 (05) :545-559
[8]  
Dittmann J, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 2, P209, DOI 10.1109/MMCS.1999.778274
[9]  
Fridrich J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P178, DOI 10.1109/ITCC.2000.844203
[10]   Content-based image authentication: Current status, issues, and challenges [J].
Han, Shuihua ;
Chu, Chao-Hsien ;
Yang, Shuangyuan .
ICSC 2007: INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING, PROCEEDINGS, 2007, :630-+