A Novel Robust Image-hashing Method for Content Authentication

被引:2
|
作者
Jiang, Cuiling [1 ]
Pang, Yilin [1 ]
Wu, Anwen [1 ]
机构
[1] East China Univ Sci & Technol, Sch Informat Sci & Engn, Shanghai, Peoples R China
关键词
image hash; genetic algorithm; BP network; discrimination; FEATURE POINTS; SECURE; ALGORITHM; SCHEME;
D O I
10.1109/SocialSec2015.15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image hash functions find extensive application in content authentication, database search, and digital forensic. This paper develops a novel robust image-hashing method based on genetic algorithm (GA) and Back Propagation (BP) Neural Network for content authentication. Lifting wavelet transform is used to extract image low frequency coefficients to create the image feature matrix. A GA-BP network model is constructed to generate image-hashing code. Experimental results demonstrate that the proposed hashing method is robust against random attack, JPEG compression, additive Gaussian noise, and so on. Receiver operating characteristics (ROC) analysis over a large image database reveals that the proposed method significantly outperforms other approaches for robust image hashing.
引用
收藏
页码:22 / 27
页数:6
相关论文
共 50 条
  • [1] Robust Image Hashing Technique for Content Authentication based on DWT
    Vadlamudi, Lokanadham Naidu
    Vaddella, Rama Prasad V.
    Devara, Vasumathi
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2016, VOL 1, 2017, 459 : 181 - 191
  • [2] Robust Speech Hashing for Content Authentication
    Jiao, Yuhua
    Ji, Liping
    Niu, Xiamu
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2009, 16 (09) : 818 - 821
  • [3] Image Authentication by Content Preserving Robust Image Hashing Using Local and Global Features
    Sebastian, Lima S.
    Varghese, Abraham
    Manesh, T.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 1554 - 1560
  • [4] A novel hashing scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    [J]. 2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 486 - +
  • [5] Image authentication based on robust image hashing with geometric correction
    Ram Kumar Karsh
    Arunav Saikia
    Rabul Hussain Laskar
    [J]. Multimedia Tools and Applications, 2018, 77 : 25409 - 25429
  • [6] Image authentication based on robust image hashing with geometric correction
    Karsh, Ram Kumar
    Saikia, Arunav
    Laskar, Rabul Hussain
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) : 25409 - 25429
  • [7] A Novel Image Signature Method for Content Authentication
    Wang, Xiaofeng
    Zheng, Nanning
    Xue, Jianru
    Liu, Zhenli
    [J]. COMPUTER JOURNAL, 2012, 55 (06): : 686 - 701
  • [8] Robust Hashing Based on Quaternion Zernike Moments for Image Authentication
    Ouyang, Junlin
    Wen, Xingzi
    Liu, Jianxun
    Chen, Jinjun
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2016, 12 (04)
  • [9] Robust Hashing Based on Quaternion Gyrator Transform for Image Authentication
    Ouyang, Junlin
    Zhang, Xiao
    Wen, Xingzi
    [J]. IEEE ACCESS, 2020, 8 : 220585 - 220594
  • [10] A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication
    Shaik, Abdul Subhani
    Karsh, Ram Kumar
    Islam, Mohiul
    Singh, Surendra Pal
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022