Compact and Robust Image Hashing

Image hashing is an alternative approach to many applications accomplished with watermarking. In this paper, we propose a novel image hashing method in the DCT Domain which can be directly extended to MPEG video without DCT transforms. A key goal of the method is to produce randomized hash signatures which are unpredictable for unauthorized users, thereby yielding properties akin to cryptographic MACs. This is achieved by encryption of the block DCT coefficients with chaotic sequences. After applying Principal Components Analysis (PCA) to the encrypted DCT coefficients, we take the quantized eigenvector matrix (8 × 8) and 8 eigenvalues together as the hash signature, the length of which is only 72 bytes for any image of arbitrary size. For image authentication, we also present an algorithm for locating tampering based on the hashing method. Experiments on large-scale database show that the proposed method is efficient, key dependent, pairwise independence, robust against common content-preserving manipulations.

[1]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[2]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[3]  Jiaoying Shi,et al.  Digital watermarking systems with chaotic sequences , 1999, Electronic Imaging.

[4]  C. Kailasanathan,et al.  Image Authentication Surviving Acceptable Modications Using Statistical Measures and K-mean Segmentation , 2001 .

[5]  Jean-Didier Legat,et al.  RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.

[6]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[7]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[8]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..

[9]  J. Edward Jackson,et al.  A User's Guide to Principal Components: Jackson/User's Guide to Principal Components , 2004 .

[10]  Shih-Fu Chang,et al.  Robust digital signature for multimedia authentication , 2003 .

[11]  Chun-Shien Lu,et al.  Geometric distortion-resilient image hashing system and its application scalability , 2004, MM&Sec '04.

[12]  Ton Kalker,et al.  A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..

[13]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[14]  Nasir M. Rajpoot,et al.  Radon/ridgelet signature for image authentication , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[15]  Tiago Rosa Maria Paula Queluz Authentication of digital images and video: Generic models and a new contribution , 2001, Signal processing. Image communication.

[16]  Benoit M. Macq,et al.  A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[17]  J. Edward Jackson,et al.  A User's Guide to Principal Components. , 1991 .

[18]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[19]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[20]  V. Monga,et al.  Clustering algorithms for perceptual image hashing , 2004, 3rd IEEE Signal Processing Education Workshop. 2004 IEEE 11th Digital Signal Processing Workshop, 2004..

[21]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[22]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[23]  Vishal Monga,et al.  Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[24]  Ramarathnam Venkatesan,et al.  New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.

[25]  J. E. Jackson A User's Guide to Principal Components , 1991 .

[26]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.