Image Authentication Using Robust Image Hashing with Localization and Self-Recovery

被引:0
|
作者
Hassan, Ammar M. [1 ]
Al-Hamadi, Ayoub [1 ]
Michaelis, Bernd [1 ]
Hasan, Yassin M. Y. [2 ]
Wahab, Mohamed A. A. [3 ]
机构
[1] Otto Von Guericke Univ, IESK, Magdeburg, Germany
[2] Taibah Univ, Comp Sc & Info Dept, Madinah, Saudi Arabia
[3] Menia Univ, Dept Elect Engn, Al Minya, Egypt
关键词
Cryptographic hashing; image authentication; image hashing; watermarking;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The rapid growth of efficient tools, which generate and edit digital images demands effective methods for assuring integrity of images. A semi-fragile block-based image authentication technique is proposed which can not only localize the alteration detections but also recover the missing contents. The proposed technique distinguishes content-preserving manipulations from the content alterations using secure image hashing instead of cryptographic hashing. The original image is divided into large blocks (sub-images) which are also divided into 8x8 blocks. Secure image hashing is utilized to generate the sub-image hash (signature) which may slightly change when the content-preserving manipulations are applied. Furthermore, the sub-image code is generated using the JPEG compression scheme. Then, two sub-image hash copies and the sub-image code are embedded into relatively-distant sub-images using a doubly linked chain which prevents the vector quantization attack. The hash and code bits are robustly embedded in chosen discrete cosine transform (DCT) coefficients exploiting a property of DCT coefficients which is invariant before and after JPEG compression. The experimental results show that the proposed technique can successfully both localize and compensate the content alterations. Furthermore, it can effectively thwart many attacks such as vector quantization attacks.
引用
收藏
页码:251 / +
页数:3
相关论文
共 50 条
  • [1] Semi-Fragile Image Authentication Using Robust Image Hashing with Localization
    Hassan, Ammar M.
    Al-Hamadi, Ayoub
    Michaelis, Bernd
    Hasan, Yassin. M. Y.
    Wahab, Mohamed A. A.
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON MACHINE VISION, PROCEEDINGS, ( ICMV 2009), 2009, : 133 - +
  • [2] A self-recovery fragile watermarking scheme for image authentication with superior localization
    He HongJie
    Zhang JiaShu
    Chen Fan
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (10): : 1487 - 1507
  • [3] VARIABLE BLOCK-SIZE IMAGE AUTHENTICATION WITH LOCALIZATION AND SELF-RECOVERY
    Hassan, A. M.
    Al-Hamadi, A.
    Hasan, Y. M. Y.
    Wahab, M. A. A.
    Panning, A.
    Michaelis, B.
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, : 3665 - 3668
  • [4] A self-recovery fragile watermarking scheme for image authentication with superior localization
    HE HongJie1
    2 Information Security and National Computing Grid Lab
    [J]. Science China(Information Sciences), 2008, (10) : 1487 - 1507
  • [5] A self-recovery fragile watermarking scheme for image authentication with superior localization
    HongJie He
    JiaShu Zhang
    Fan Chen
    [J]. Science in China Series F: Information Sciences, 2008, 51 : 1487 - 1507
  • [6] A new self-recovery technique for image authentication
    Caldelli, R
    Bartolini, F
    Cappellini, V
    Piva, A
    Barni, M
    [J]. VISUAL CONTENT PROCESSING AND REPRESENTATION, PROCEEDINGS, 2003, 2849 : 164 - 171
  • [7] Image Self-Recovery Based on Authentication Feature Extraction
    Liu, Tong
    Yuan, Xiaochen
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1223 - 1228
  • [8] Stereo Image Watermarking Method for Authentication with Self-Recovery Capability
    Wang, Jing
    Jiang, Gangyi
    Chen, Fen
    Zeng, Xingbin
    Wang, Xiaodong
    Yu, Mei
    Ho, Yo-Sung
    [J]. PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFTWARE ENGINEERING (ICAISE 2013), 2013, 37 : 49 - 53
  • [9] Image Content Authentication and Self-recovery Using Rehashing and Matrix Combined Method
    Li, Xue-Jing
    Lyu, Wan-Li
    Xie, Jie
    [J]. ADVANCES IN IMAGE AND GRAPHICS TECHNOLOGIES, IGTA 2016, 2016, 634 : 209 - 219
  • [10] A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing
    Zhang, Rui
    Xiao, Di
    Chang, Yanting
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,