Robust image hashing using progressive feature selection for tampering detection

被引:24
作者
Pun, Chi-Man [1 ]
Yan, Cai-Ping
Yuan, Xiao-Chen [1 ]
机构
[1] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
关键词
Robust image hashing; Progressive feature point selection; Tampering detection; Image authentication; Horizontal location-context hashing (HLCH); Vertical location-context hashing (VLCH); SECURE; QUANTIZATION; MOMENTS;
D O I
10.1007/s11042-017-4809-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The main problem addressed in this paper is the robust tamper detection of the image received in a transmission under various content-preserving attacks. To this aim the progressive feature point selection method is proposed to extract the feature points of high robustness; with which, the local feature and color feature are then generated for each feature point. Afterwards, the robust image hashing construction method is proposed by using the location-context information of the features. The constructed hash is attached to the image before transmission and it can be used for analyzing at destination to filter out the geometric transformations occurred in the received image. After image restoration, the similarity of the global hashes between the source image and restored image is calculated to determine whether the received image has the same contents as the trusted one or has been maliciously tampered. When the received image being judged as a tampered image, the hashes calculated with the proposed Horizontal Location-Context Hashing (HLCH) and Vertical Location-Context Hashing (VLCH) methods will be used to locate the tampered regions. Experimental results on different images with tampering of arbitrary size and location demonstrate that our image authentication and tampering localization scheme are superior to the state-of-the-art methods under various attacks.
引用
收藏
页码:11609 / 11633
页数:25
相关论文
共 30 条
  • [1] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    [J]. SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [2] Robust Image Alignment for Tampering Detection
    Battiato, Sebastiano
    Farinella, Giovanni Maria
    Messina, Enrico
    Puglisi, Giovanni
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1105 - 1117
  • [3] Speeded-Up Robust Features (SURF)
    Bay, Herbert
    Ess, Andreas
    Tuytelaars, Tinne
    Van Gool, Luc
    [J]. COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) : 346 - 359
  • [4] A robust detection algorithm for copy-move forgery in digital images
    Cao, Yanjun
    Gao, Tiegang
    Fan, Li
    Yang, Qunting
    [J]. FORENSIC SCIENCE INTERNATIONAL, 2012, 214 (1-3) : 33 - 43
  • [5] Sequential quantization strategy for data embedding and integrity verification
    Cheung, Yiu-ming
    Wu, Hao-tian
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2007, 17 (08) : 1007 - 1016
  • [6] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [7] A local Tchebichef moments-based robust image watermarking
    Deng, Cheng
    Gao, Xinbo
    Li, Xuelong
    Tao, Dacheng
    [J]. SIGNAL PROCESSING, 2009, 89 (08) : 1531 - 1539
  • [8] Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions
    Gao, Xinbo
    Deng, Cheng
    Li, Xuelong
    Tao, Dacheng
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (03): : 278 - 286
  • [9] Harris C., 1988, P 4 ALV VIS C, V15, P10, DOI DOI 10.5244/C.2.23
  • [10] Detection of copy-move image forgery using histogram of orientated gradients
    Lee, Jen-Chun
    Chang, Chien-Ping
    Chen, Wei-Kuei
    [J]. INFORMATION SCIENCES, 2015, 321 : 250 - 262