Image authentication based on perceptual hash using Gabor filters

被引:11
作者
Wang, Lina [1 ,2 ]
Jiang, Xiaqiu [1 ]
Lian, Shiguo [3 ]
Hu, Donghui [1 ,4 ]
Ye, Dengpan [1 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
[2] Minist Educ, Key Lab Aerosp Informat Secur & Trust Comp, Wuhan 430072, Hubei, Peoples R China
[3] France Telecom R&D Beijing, HCI Lab, Beijing 100080, Peoples R China
[4] Hefei Univ Technol, Sch Comp Sci & Informat, Hefei 230009, Peoples R China
基金
中国国家自然科学基金;
关键词
Image authentication; Perceptual hash; Gabor filter; Reference metrics; ROBUST;
D O I
10.1007/s00500-009-0529-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Image authentication is an important topic in image forensics, which tells whether an image is tampered or not or even tells the tampered regions. To implement image authentication, image hash techniques have been reported recently. In this paper, we investigate existing image hash algorithms, and design an novel image hash based on human being's visual system. In this algorithm, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human's primary visual cortex. For a given image, we compute the reference scale, direction and block to make sure the final hash can resist against rotation, scale, and translation attacks while maintain the sensitivity to local malicious manipulations. In addition, it has another promising ability to locate the tampered image blocks, and approximately determining the type of tampering methods (delete, add, modify) and the original direction of each block. This ability is very useful in forensics. The experimental results show that the strategy of the reference metrics works quite well and our method is much more effective than the other state of art image hash methods. Moreover, our method can still locate the content-altering changes even undergo some content-preserving manipulations.
引用
收藏
页码:493 / 504
页数:12
相关论文
共 50 条
[31]   Self-Authentication Scheme Based on Semi-Fragile Watermarking and Perceptual Hash Function [J].
Rhayma, Hanen ;
Makhloufi, Achraf ;
Ben Hmida, Ahmed .
2014 FIRST INTERNATIONAL IMAGE PROCESSING, APPLICATIONS AND SYSTEMS CONFERENCE (IPAS), 2014,
[32]   Perceptual hashing for image authentication: A survey [J].
Du, Ling ;
Ho, Anthony T. S. ;
Cong, Runmin .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 81
[33]   Image perceptual hashing for content authentication based on Watson's visual model and LLE [J].
Xing, Huifen ;
Che, Hui ;
Wu, Qilin ;
Wang, Honghai .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2023, 20 (01)
[34]   Log-Gabor Filters for Image-Based Vehicle Verification [J].
Arrospide, Jon ;
Salgado, Luis .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2013, 22 (06) :2286-2295
[35]   AUTHENTICATION OF MP4 FILE BY PERCEPTUAL HASH AND DATA HIDING [J].
Maung, April Pyone Maung ;
Ten, Yiqi ;
Wong, KokSheik .
MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2019, 32 (04) :304-314
[36]   Perceptual hash algorithm for integrity authentication of multispectral remote sensing images [J].
Ding, Kai-Meng ;
Zhu, Chang-Qing ;
Su, Shou-Bao ;
Wang, Shao-Ping .
Guangxue Jingmi Gongcheng/Optics and Precision Engineering, 2015, 23 :677-684
[37]   Fingerprint Authentication using Gabor Filter based Matching Algorithm [J].
Chavan, Satishkumar ;
Mundada, Parth ;
Pal, Devendra .
2015 INTERNATIONAL CONFERENCE ON TECHNOLOGY FOR SUSTAINABLE DEVELOPMENT (ICTSD-2015), 2015,
[38]   Gabor Filters for Degraded Document Image Binarization [J].
Sehad, Abdenour ;
Chibani, Youcef ;
Cheriet, Mohamed .
2014 14TH INTERNATIONAL CONFERENCE ON FRONTIERS IN HANDWRITING RECOGNITION (ICFHR), 2014, :702-707
[39]   Robust image hash in Radon transform domain for authentication [J].
Lei, Yanqiang ;
Wang, Yuangen ;
Huang, Jiwu .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (06) :280-288
[40]   An authentication method based on perceptual hashing and watermarking for remote sensing image [J].
Wang Y.-H. ;
Zhu C.-Q. ;
Su S.-B. ;
Ding K.-M. .
Guangxue Jingmi Gongcheng/Optics and Precision Engineering, 2016, 24 :640-648