Robust Hashing for Image Authentication Using Zernike Moments and Local Features

A robust hashing method is developed for detecting image forgery including removal, insertion, and replacement of objects, and abnormal color modification, and for locating the forged area. Both global and local features are used in forming the hash sequence. The global features are based on Zernike moments representing luminance and chrominance characteristics of the image as a whole. The local features include position and texture information of salient regions in the image. Secret keys are introduced in feature extraction and hash construction. While being robust against content-preserving image processing, the hash is sensitive to malicious tampering and, therefore, applicable to image authentication. The hash of a test image is compared with that of a reference image. When the hash distance is greater than a threshold τ1 and less than τ2, the received image is judged as a fake. By decomposing the hashes, the type of image forgery and location of forged areas can be determined. Probability of collision between hashes of different images approaches zero. Experimental results are presented to show effectiveness of the method.

[1]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[2]  Liqing Zhang,et al.  Saliency Detection: A Spectral Residual Approach , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[3]  Zen Chen,et al.  A Zernike Moment Phase-Based Descriptor for Local Image Representation and Matching , 2010, IEEE Transactions on Image Processing.

[4]  Hermann Ney,et al.  Features for Image Retrieval: A Quantitative Comparison , 2004, DAGM-Symposium.

[5]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[6]  Fouad Khelifi,et al.  Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.

[7]  Xinpeng Zhang,et al.  Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .

[8]  Fouad Khelifi,et al.  Analysis of the Security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization , 2010, IEEE Signal Processing Letters.

[9]  Min Wu,et al.  Multimedia forensic hash based on visual words , 2010, 2010 IEEE International Conference on Image Processing.

[10]  Yanqiang Lei,et al.  Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..

[11]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[12]  Min Wu,et al.  Forensic hash for multimedia information , 2010, Electronic Imaging.

[13]  Vishal Monga,et al.  A clustering based approach to perceptual image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[14]  Z. Jane Wang,et al.  Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Xinpeng Zhang,et al.  Lexicographical framework for image hashing with implementation based on DCT and NMF , 2009, Multimedia Tools and Applications.

[16]  Glen P. Abousleman,et al.  Orthogonal Rotation-Invariant Moments for Digital Image Processing , 2008, IEEE Transactions on Image Processing.

[17]  Jiwu Huang,et al.  Histogram-based image hashing scheme robust against geometric deformations , 2007, MM&Sec.

[18]  Shan Li,et al.  Complex Zernike Moments Features for Shape-Based Image Retrieval , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[19]  Hideyuki Tamura,et al.  Textural Features Corresponding to Visual Perception , 1978, IEEE Transactions on Systems, Man, and Cybernetics.

[20]  Stephen E. Fienberg,et al.  Testing Statistical Hypotheses , 2005 .