Image authentication under geometric attacks via concentric square partition based image hashing

Robust image hashing techniques have been extensively studied in the recent years, with constant improvements. The challenge is that the hashing schemes need to be robust to most content-preservation operations (CPOs) and at the same time have reliable discriminative capability. One of the most important application of such image hashing techniques is image authentication. Most of the existing image hashing techniques are not robust to geometric attacks e.g. rotation and composite rotation-scaling-translation (RST). In this paper, we propose a novel image authentication model that uses a blind approach for geometric distortion correction. The hashing scheme is based on concentric square partition and statistical feature vector distances, thus making it perceptually robust and at the same time sensitive to visually distinct images. Experimental results show the proposed method outperforms some state-of-the-art models and gives desirable result for all CPOs and geometric attacks as well.

[1]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[2]  Xinpeng Zhang,et al.  Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.

[3]  Mark Stamp,et al.  Information security - principles and practice , 2005 .

[4]  Aditi,et al.  Robust image hashing through DWT-SVD and spectral residual method , 2017, EURASIP Journal on Image and Video Processing.

[5]  Yanqiang Lei,et al.  Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..

[6]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[7]  Shichao Zhang,et al.  Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.

[8]  Ram Kumar Karsh,et al.  Robust image hashing using ring partition-PGNMF and local features , 2016, SpringerPlus.

[9]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[10]  Ram Kumar Karsh,et al.  Perceptual robust and secure image hashing using ring partition-PGNMF , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.

[11]  Ming Zhu,et al.  Quaternion Fourier-Mellin moments for color images , 2011, Pattern Recognit..

[12]  Huazhong Shu,et al.  Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform , 2015, Digit. Signal Process..

[13]  Chi-Man Pun,et al.  Quaternion-Based Image Hashing for Adaptive Tampering Localization , 2016, IEEE Transactions on Information Forensics and Security.

[14]  M. C. Adhikary,et al.  Digital Image Tamper Detection Techniques - A Comprehensive Study , 2013, ArXiv.

[15]  Xinpeng Zhang,et al.  Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .