Image Authentication Using Image Hashing Based on Ring Partition with Corner Inclusion

Due to the availability of advanced image editing tools, existing image hashing techniques for image content authentication needs to be enhanced. Some of the recent better existing techniques based on ring partition cannot explore the complete content information available in the image. It is observed that around 50% of the corner information of the image remains unexplored. This paper presents an image hashing technique that tries to make use of corner information to generate the hash, which is more robust and discriminative than the existing ring partition based techniques. The algorithm based on ring partition and invariant vector distance that generates hash using intensity channel has been used to prepare the baseline system. The baseline system is extended by including the corner information of the intensity channel to develop the proposed model. It also uses the central orientation of the original image to make the system rotation invariant. The receiver operating characteristics (ROC) shows that the proposed model outperform some of the state-of-the-art methods.

[1]  Xinpeng Zhang,et al.  Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.

[2]  Z. Jane Wang,et al.  Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Jiwu Huang,et al.  Histogram-based image hashing scheme robust against geometric deformations , 2007, MM&Sec.

[4]  Ram Kumar Karsh,et al.  Robust image hashing using ring partition-PGNMF and local features , 2016, SpringerPlus.

[5]  Huazhong Shu,et al.  Robust hashing for image authentication using SIFT feature and quaternion Zernike moments , 2015, Multimedia Tools and Applications.

[6]  Shichao Zhang,et al.  Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.

[7]  Jianru Xue,et al.  A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Rabul Hussain Laskar,et al.  Copy-move forgery detection using ASIFT , 2016, 2016 1st India International Conference on Information Processing (IICIP).

[9]  Bhanu Bhai Richhariya,et al.  Robust and secure hashing using Gabor filter and Markov absorption probability , 2016, 2016 International Conference on Communication and Signal Processing (ICCSP).

[10]  Xinpeng Zhang,et al.  Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .

[11]  Shichao Zhang,et al.  Robust Perceptual Image Hashing Based on Ring Partition and NMF , 2014, IEEE Transactions on Knowledge and Data Engineering.

[12]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[13]  Aditi,et al.  Robust image hashing through DWT-SVD and spectral residual method , 2017, EURASIP Journal on Image and Video Processing.

[14]  Ram Kumar Karsh,et al.  Perceptual robust and secure image hashing using ring partition-PGNMF , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.

[15]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[16]  Zhenjun Tang,et al.  Robust image hashing using ring-based entropies , 2013, Signal Process..

[17]  Rabul Hussain Laskar,et al.  Image authentication based on robust image hashing with geometric correction , 2018, Multimedia Tools and Applications.

[18]  Yanqiang Lei,et al.  Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..

[19]  Mohiul Islam,et al.  Geometric distortion correction based robust watermarking scheme in LWT-SVD domain with digital watermark extraction using SVM , 2017, Multimedia Tools and Applications.