Image authentication based on perceptual hash using Gabor filters

被引:11
|
作者
Wang, Lina [1 ,2 ]
Jiang, Xiaqiu [1 ]
Lian, Shiguo [3 ]
Hu, Donghui [1 ,4 ]
Ye, Dengpan [1 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
[2] Minist Educ, Key Lab Aerosp Informat Secur & Trust Comp, Wuhan 430072, Hubei, Peoples R China
[3] France Telecom R&D Beijing, HCI Lab, Beijing 100080, Peoples R China
[4] Hefei Univ Technol, Sch Comp Sci & Informat, Hefei 230009, Peoples R China
基金
中国国家自然科学基金;
关键词
Image authentication; Perceptual hash; Gabor filter; Reference metrics; ROBUST;
D O I
10.1007/s00500-009-0529-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Image authentication is an important topic in image forensics, which tells whether an image is tampered or not or even tells the tampered regions. To implement image authentication, image hash techniques have been reported recently. In this paper, we investigate existing image hash algorithms, and design an novel image hash based on human being's visual system. In this algorithm, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human's primary visual cortex. For a given image, we compute the reference scale, direction and block to make sure the final hash can resist against rotation, scale, and translation attacks while maintain the sensitivity to local malicious manipulations. In addition, it has another promising ability to locate the tampered image blocks, and approximately determining the type of tampering methods (delete, add, modify) and the original direction of each block. This ability is very useful in forensics. The experimental results show that the strategy of the reference metrics works quite well and our method is much more effective than the other state of art image hash methods. Moreover, our method can still locate the content-altering changes even undergo some content-preserving manipulations.
引用
收藏
页码:493 / 504
页数:12
相关论文
共 50 条
  • [21] Content Based Image Retrieval using Gabor Filters and Color Coherence Vector
    Singh, Jyotsna
    Bajaj, Ahsaas
    Mittal, Anirudh
    Khanna, Ansh
    Karwayun, Rishabh
    PROCEEDINGS OF THE 2018 IEEE 8TH INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC 2018), 2018, : 290 - 295
  • [22] IMAGE FORGERY DETECTION USING GABOR FILTERS AND DCT
    Muhammad, Ghulam
    Dewan, M. Solaiman
    Moniruzzaman, M.
    Hussain, Muhammad
    Huda, M. Nurul
    2014 1ST INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION & COMMUNICATION TECHNOLOGY (ICEEICT 2014), 2014,
  • [23] Medical Image Segmentation Based on Gabor Filters and SOFM
    Wang, Yao
    Xu, Wenbo
    Sun, Jun
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 295 - 299
  • [24] Robust hash generation technique for content-based image authentication using histogram
    Vadlamudi, Lokanadham Naidu
    Vaddella, Rama Prasad V.
    Devara, Vasumathi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (11) : 6585 - 6604
  • [25] Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery
    Xu, Dingjie
    Ren, Na
    Zhu, Changqing
    REMOTE SENSING, 2023, 15 (19)
  • [26] Robust hash generation technique for content-based image authentication using histogram
    Lokanadham Naidu Vadlamudi
    Rama Prasad V. Vaddella
    Vasumathi Devara
    Multimedia Tools and Applications, 2016, 75 : 6585 - 6604
  • [27] Fast texture and structure image reconstruction using the perceptual hash
    Voronin, V. V.
    Marchuk, V. I.
    Frantc, V. A.
    Egiazarian, K. O.
    IMAGE PROCESSING: ALGORITHMS AND SYSTEMS XI, 2013, 8655
  • [28] A Novel Integrity Authentication Algorithm Based on Perceptual Speech Hash and Learned Dictionaries
    Shi, Canghong
    Li, Xiaojie
    Wang, Hongxia
    IEEE ACCESS, 2020, 8 : 22249 - 22265
  • [29] An Improved Perceptual Hash Algorithm Based on U-Net for the Authentication of High-Resolution Remote Sensing Image
    Ding, Kaimeng
    Yang, Zedong
    Wang, Yingying
    Liu, Yueming
    APPLIED SCIENCES-BASEL, 2019, 9 (15):
  • [30] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470