Extraction of shape feature for image authentication

In this paper, a shape feature using Zernike moments for image authentication is proposed. It can be used as an image hash sequence. At first the color space of the input image is transformed from RGB to YCbCr. Then these three components are mapped to a unit circle by conformal mapping. Then Zernike moments of three image component s are calculated and the amplitudes and phases of modified Zernike moments are connected to form the intermediate hash. Lastly, the final hash sequence is obtained by pseudo-randomly permuting the intermediate hash sequence. Similarity between hashes is measured by a new distance defined in this paper. Experimental results show that this method is robust against most content-preserving attacks. The threshold can be got by robustness and uniqueness tests. The distance of hashes between two different images is bigger than the threshold. And this method can be used to detect image forgery involving structural and color modifications.

[1]  Xinpeng Zhang,et al.  Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .

[2]  Fouad Khelifi,et al.  Analysis of the Security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization , 2010, IEEE Signal Processing Letters.

[3]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[4]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[5]  Shan Li,et al.  Complex Zernike Moments Features for Shape-Based Image Retrieval , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[6]  Di Wu,et al.  A novel image hash algorithm resistant to print-scan , 2009, Signal Process..

[7]  Chandan Singh,et al.  Computation of Zernike moments in improved polar configuration , 2009, IET Image Process..

[8]  Guorui Feng,et al.  A Robust Image Hashing Method Based on Zernike Moments , 2010 .

[9]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[10]  Stefano Tubaro,et al.  Hash-Based Identification of Sparse Image Tampering , 2009, IEEE Transactions on Image Processing.

[11]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..