A Short Survey on Perceptual Hash Function

The authentication of digital image has become more important as these images can be easily manipulated by using image processing tools leading to various problems such as copyright infringement and hostile tampering to the image contents. It is almost impossible to distinguish subjectively which images are original and which have been manipulated. There are several cryptographic hash functions that map the input data to short binary strings but these traditional cryptographic hash functions is not suitable for image authentication as they are very sensitive to every single bit of input data. When using a cryptographic hash function, the change of even one bit of the original data results in a radically different value. A modified image should be detected as authentic by the hash function and at the same time must be robust against incidental and legitimate modifications on multimedia data. The main aim of this paper is to present a survey of perceptual hash functions for image authentication. Keywords: Hash function, image authentication *Cite as: Arambam Neelima, Kh. Manglem Singh, “A Short Survey on Perceptual Hash Function” ADBU-J.Engg Tech, 1(2014) 0011405(8pp)

[1]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[2]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[3]  Dimitrios Hatzinakos,et al.  Content Based Image Hashing Via Wavelet and Radon Transform , 2007, PCM.

[4]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[5]  Jean-Didier Legat,et al.  RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.

[6]  William Stallings,et al.  Cryptography and network security , 1998 .

[7]  Shih-Fu Chang,et al.  A Robust and Secure Media Signature Scheme for JPEG Images , 2005, J. VLSI Signal Process..

[8]  Di Wu,et al.  A novel image hash algorithm resistant to print-scan , 2009, Signal Process..

[9]  William Puech,et al.  A robust and secure perceptual hashing system based on a quantization step analysis , 2013, Signal Process. Image Commun..

[10]  Ramarathnam Venkatesan,et al.  New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.

[11]  Brian M. Kurkoski,et al.  Robust image hashing using image normalization and SVD decomposition , 2011, 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS).

[12]  Min Wu,et al.  Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[13]  Jong Hyuk Park,et al.  Image hash generation method using hierarchical histogram , 2010, Multimedia Tools and Applications.

[14]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[15]  Zhenjun Tang,et al.  Robust image hashing using ring-based entropies , 2013, Signal Process..

[16]  William Stallings,et al.  Cryptography and Network Security (4th Edition) , 2005 .

[17]  Benoit M. Macq,et al.  A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[18]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[19]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[20]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[21]  Yanqiang Lei,et al.  Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..

[22]  Zhenjun Tang,et al.  Robust image hash function using local color features , 2013 .

[23]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[24]  Fang Liu,et al.  Perceptual Image Hashing via Wave Atom Transform , 2011, IWDW.

[25]  Zhenjun Tang,et al.  Perceptual Hashing for Color Images Using Invariant Moments , 2012 .

[26]  Jiwu Huang,et al.  Histogram-based image hashing scheme robust against geometric deformations , 2007, MM&Sec.

[27]  Xinpeng Zhang,et al.  Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .