Image authentication based on perceptual hash using Gabor filters

Image authentication is an important topic in image forensics, which tells whether an image is tampered or not or even tells the tampered regions. To implement image authentication, image hash techniques have been reported recently. In this paper, we investigate existing image hash algorithms, and design an novel image hash based on human being's visual system. In this algorithm, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human’s primary visual cortex. For a given image, we compute the reference scale, direction and block to make sure the final hash can resist against rotation, scale, and translation attacks while maintain the sensitivity to local malicious manipulations. In addition, it has another promising ability to locate the tampered image blocks, and approximately determining the type of tampering methods (delete, add, modify) and the original direction of each block. This ability is very useful in forensics. The experimental results show that the strategy of the reference metrics works quite well and our method is much more effective than the other state of art image hash methods. Moreover, our method can still locate the content-altering changes even undergo some content-preserving manipulations.

[1]  Tiago Rosa Maria Paula Queluz Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[2]  Hou Qi Robust Image Authentication Method Combing SVD and PKI , 2004 .

[3]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  Chin-Chen Chang,et al.  Novel image copy detection with rotating tolerance , 2007, J. Syst. Softw..

[5]  Shiguo Lian,et al.  Secure hash function based on neural network , 2006, Neurocomputing.

[6]  Pierre Vandergheynst,et al.  End-stopped wavelets for detecting low-level features , 1999, Optics & Photonics.

[7]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[8]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[9]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[10]  Shiguo Lian IMAGE AUTHENTICATION BASED ON FRACTAL FEATURES , 2008 .

[11]  Walter F. Tichy,et al.  Thematic Role Based Generation of UML Models from Real World Requirements , 2007 .

[12]  Unusual choroid pigment distribution in the retina of a south american frog , 1980, Vision Research.

[13]  Chao-Hsien Chu,et al.  Content-based Image Authentication: Current Status, Issues, and Challenges , 2007 .

[14]  Yuewei Dai,et al.  Secure multimedia watermarking authentication in wavelet domain , 2008, J. Electronic Imaging.

[15]  Bian Yang,et al.  Block Mean Value Based Image Perceptual Hashing , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[16]  Zhang Xin-peng,et al.  Recent development of perceptual image hashing , 2007 .

[17]  Dimitris Kanellopoulos,et al.  Recent Advances in Multimedia Information System Security , 2009, Informatica.

[18]  王朔中,et al.  Recent development of perceptual image hashing , 2007 .

[19]  Shiguo Lian,et al.  On the analysis and design of secure multimedia authentication scheme , 2008, 2008 Third International Conference on Communications and Networking in China.

[20]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[21]  J. P. Jones,et al.  An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex. , 1987, Journal of neurophysiology.

[22]  Pedro Cano,et al.  A review of algorithms for audio fingerprinting , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[23]  Rita Noumeir,et al.  Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.

[24]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[25]  Changick Kim,et al.  Content-based image copy detection , 2003, Signal Process. Image Commun..

[26]  Vishal Monga,et al.  Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[27]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[28]  D. G. Albrecht,et al.  Spatial frequency selectivity of cells in macaque visual cortex , 1982, Vision Research.

[29]  J. Daugman Two-dimensional spectral analysis of cortical receptive field profiles , 1980, Vision Research.

[30]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[31]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[32]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).