Image authentication based on perceptual hash using Gabor filters

被引:11
|
作者
Wang, Lina [1 ,2 ]
Jiang, Xiaqiu [1 ]
Lian, Shiguo [3 ]
Hu, Donghui [1 ,4 ]
Ye, Dengpan [1 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
[2] Minist Educ, Key Lab Aerosp Informat Secur & Trust Comp, Wuhan 430072, Hubei, Peoples R China
[3] France Telecom R&D Beijing, HCI Lab, Beijing 100080, Peoples R China
[4] Hefei Univ Technol, Sch Comp Sci & Informat, Hefei 230009, Peoples R China
基金
中国国家自然科学基金;
关键词
Image authentication; Perceptual hash; Gabor filter; Reference metrics; ROBUST;
D O I
10.1007/s00500-009-0529-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Image authentication is an important topic in image forensics, which tells whether an image is tampered or not or even tells the tampered regions. To implement image authentication, image hash techniques have been reported recently. In this paper, we investigate existing image hash algorithms, and design an novel image hash based on human being's visual system. In this algorithm, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human's primary visual cortex. For a given image, we compute the reference scale, direction and block to make sure the final hash can resist against rotation, scale, and translation attacks while maintain the sensitivity to local malicious manipulations. In addition, it has another promising ability to locate the tampered image blocks, and approximately determining the type of tampering methods (delete, add, modify) and the original direction of each block. This ability is very useful in forensics. The experimental results show that the strategy of the reference metrics works quite well and our method is much more effective than the other state of art image hash methods. Moreover, our method can still locate the content-altering changes even undergo some content-preserving manipulations.
引用
收藏
页码:493 / 504
页数:12
相关论文
共 50 条
  • [1] Image authentication based on perceptual hash using Gabor filters
    Lina Wang
    Xiaqiu Jiang
    Shiguo Lian
    Donghui Hu
    Dengpan Ye
    Soft Computing, 2011, 15 : 493 - 504
  • [2] Robust Perceptual Image Hash Using Gabor Filters
    Wang, Lina
    Jiang, Xiaqiu
    Hu, Donghui
    Ye, Dengpan
    Lian, Shiguo
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 53 - +
  • [3] Image alignment based perceptual image hash for content authentication
    Wang, Xiaofeng
    Zhou, Xiaorui
    Zhang, Qian
    Xu, Bingchao
    Xue, Jianru
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 80
  • [4] A Visual Model-Based Perceptual Image Hash for Content Authentication
    Wang, Xiaofeng
    Pang, Kemu
    Zhou, Xiaorui
    Zhou, Yang
    Li, Lu
    Xue, Jianru
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1336 - 1349
  • [5] A perceptual hash based blind-watermarking scheme for image authentication
    Roy, Moumita
    Thounaojam, Dalton Meitei
    Pal, Shyamosree
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 227
  • [6] A Secure Perceptual Hash Algorithm for Image Content Authentication
    Weng, Li
    Preneel, Bart
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 108 - 121
  • [7] A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
    Ding, Kaimeng
    Chen, Shiping
    Meng, Fan
    ALGORITHMS, 2018, 11 (01)
  • [8] Perceptual hash algorithm for integrity authentication of remote sensing image
    Ding, Kaimeng
    Zhu, Changqing
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2014, 44 (04): : 723 - 727
  • [9] Robust image authentication using hash function
    Kobayashi, H
    Kiya, H
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : A435 - A438
  • [10] Deep Perceptual Hash Based on Hash Center for Image Copyright Protection
    Sun, Xiaohan
    Zhou, Jiting
    IEEE ACCESS, 2022, 10 : 120551 - 120562