A Novel Robust Image-hashing Method for Content Authentication

被引:2
|
作者
Jiang, Cuiling [1 ]
Pang, Yilin [1 ]
Wu, Anwen [1 ]
机构
[1] East China Univ Sci & Technol, Sch Informat Sci & Engn, Shanghai, Peoples R China
关键词
image hash; genetic algorithm; BP network; discrimination; FEATURE POINTS; SECURE; ALGORITHM; SCHEME;
D O I
10.1109/SocialSec2015.15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image hash functions find extensive application in content authentication, database search, and digital forensic. This paper develops a novel robust image-hashing method based on genetic algorithm (GA) and Back Propagation (BP) Neural Network for content authentication. Lifting wavelet transform is used to extract image low frequency coefficients to create the image feature matrix. A GA-BP network model is constructed to generate image-hashing code. Experimental results demonstrate that the proposed hashing method is robust against random attack, JPEG compression, additive Gaussian noise, and so on. Receiver operating characteristics (ROC) analysis over a large image database reveals that the proposed method significantly outperforms other approaches for robust image hashing.
引用
收藏
页码:22 / 27
页数:6
相关论文
共 50 条
  • [21] Perceptual hashing method for video content authentication with maximized robustness
    Ma, Qiang
    Xing, Ling
    [J]. EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2021, 2021 (01)
  • [22] Perceptual hashing method for video content authentication with maximized robustness
    Qiang Ma
    Ling Xing
    [J]. EURASIP Journal on Image and Video Processing, 2021
  • [23] On (in)security of "a robust image authentication method"
    Uehara, T
    Safavi-Naini, R
    [J]. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2002, PROCEEDING, 2002, 2532 : 1025 - 1032
  • [24] Robust image hashing
    Venkatesan, R
    Koon, SM
    Jakubowski, MH
    Moulin, P
    [J]. 2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2000, : 664 - 666
  • [25] Robust image hashing based on structural and perceptual features for authentication of color images
    Khan, Muhammad Farhan
    Monir, Syed Muhammad
    Naseem, Imran
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2021, 29 (02) : 648 - 662
  • [26] Robust hashing for image authentication using SIFT feature and quaternion Zernike moments
    Ouyang, Junlin
    Liu, Yizhi
    Shu, Huazhong
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 2609 - 2626
  • [27] Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication
    Hosny, Khalid M.
    Khedr, Yasmeen M.
    Khedr, Walid I.
    Mohamed, Ehab R.
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2018, 37 (12) : 5441 - 5462
  • [28] Robust hashing for image authentication using SIFT feature and quaternion Zernike moments
    Junlin Ouyang
    Yizhi Liu
    Huazhong Shu
    [J]. Multimedia Tools and Applications, 2017, 76 : 2609 - 2626
  • [29] Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication
    Khalid M. Hosny
    Yasmeen M. Khedr
    Walid I. Khedr
    Ehab R. Mohamed
    [J]. Circuits, Systems, and Signal Processing, 2018, 37 : 5441 - 5462
  • [30] Robust image authentication using content based compression
    Ee-Chien Chang
    Mohan S. Kankanhalli
    Xin Guan
    Zhiyong Huang
    Yinghui Wu
    [J]. Multimedia Systems, 2003, 9 : 121 - 130