A Robust Image Hashing with Enhanced Randomness by Using Random Walk on Zigzag Blocking

Security issues are important concerns of image hashing. A type of image hashing needs to randomly divide a given image into several parts, usually rectangles. However, the security problem arises due to the rectangular shapes. So, we propose a new method which enhances the randomness by dividing the image into zigzag blocks with random walk. Security analyses are provided, and experiments show our method has good distinguishing ability compared with existing methods.

[1]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[2]  Charles M. Grinstead,et al.  Introduction to probability , 1999, Statistics for the Behavioural Sciences.

[3]  Éva Tardos,et al.  Algorithm design , 2005 .

[4]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[5]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[6]  Nenghai Yu,et al.  Rotation robust detection of copy-move forgery , 2010, 2010 IEEE International Conference on Image Processing.

[7]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[8]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[9]  Lahouari Ghouti,et al.  Perceptual hashing of color images using hypercomplex representations , 2013, 2013 IEEE International Conference on Image Processing.

[10]  Sanjeev Arora,et al.  Computational Complexity: A Modern Approach , 2009 .

[11]  Kannan Ramchandran,et al.  Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[12]  Min Wu,et al.  Unicity Distance of Robust Image Hashing , 2007, IEEE Transactions on Information Forensics and Security.

[13]  John N. Tsitsiklis,et al.  Introduction to Probability , 2002 .

[14]  Marc Joye,et al.  Cryptanalysis of a Video Scrambling Based on Space Filling Curves , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[15]  Yossi Matias,et al.  A Video Scrambling Technique Based On Space Filling Curves , 1987, CRYPTO.

[16]  Soo-Chang Pei,et al.  Secure image hashing via minimum distortion estimation , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).