Wave atom transform generated strong image hashing scheme

Abstract The rapid development of multimedia technology has resulted in a rising rate on digital unauthorized utilization and forgery, which makes the situation of image authentication increasingly severe. A novel strong image hashing scheme is proposed based on wave atom transform, which can better authenticate images by precisely distinguishing the malicious tampered images from the non-maliciously processed ones. Wave atom transform is employed since it has significantly sparser expansion and better characteristics of texture feature extraction than other traditional transforms. For better detection sensitivity, gray code is applied instead of natural binary code to optimize the hamming distance. Randomizations are also performed using Renyi chaotic map for the purposes of secure image hashing and key sensitivity. The experimental results show that the proposed strong scheme is robust to non-malicious content-preserving operations and also fragile to malicious content-altering operations. The scheme also outperforms DCT and DWT based schemes in terms of receiving operating characteristic (ROC) curves. Moreover, to provide an application-defined tradeoff, a security enhancement approach based on Renyi map is presented, which can further protect the integrity and secrecy of images.

[1]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[2]  Jean-Pierre Antoine,et al.  Two-dimensional directional wavelets and the scale-angle representation , 1996, Signal Process..

[3]  Deepa Kundur,et al.  Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.

[4]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[5]  Robert W. Doran,et al.  The Gray Code , 2007, J. Univers. Comput. Sci..

[6]  Benoit M. Macq,et al.  Image watermarking: an evolution to content based approaches , 2002, Pattern Recognit..

[7]  B. N. Chatterji,et al.  An FFT-based technique for translation, rotation, and scale-invariant image registration , 1996, IEEE Trans. Image Process..

[8]  Vishal Monga,et al.  A clustering based approach to perceptual image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[9]  Shu-Fen Tu,et al.  Probability-based tampering detection scheme for digital images , 2010 .

[10]  N. Memon,et al.  Confusion/Diffusion Capabilities of Some Robust Hash Functions , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[11]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[12]  S. Mallat A wavelet tour of signal processing , 1998 .

[13]  Shuihua Han,et al.  Content-based image authentication: current status, issues, and challenges , 2009, International Journal of Information Security.

[14]  Vincent Rijmen,et al.  Analysis of the Hash Function Design Strategy Called SMASH , 2008, IEEE Transactions on Information Theory.

[15]  L. Demanet,et al.  Wave atoms and sparsity of oscillatory patterns , 2007 .

[16]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[17]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[18]  Nick Cercone,et al.  Applying the extended mass-constraint EM algorithm to image retrieval , 2008, Comput. Math. Appl..

[19]  Siwei Luo,et al.  Computers and Mathematics with Applications Fuzzy Aesthetic Semantics Description and Extraction for Art Image Retrieval , 2022 .

[20]  Jiwu Huang,et al.  Fragility Analysis of Adaptive Quantization-Based Image Hashing , 2010, IEEE Transactions on Information Forensics and Security.

[21]  Massimo Alioto,et al.  A Class of Maximum-Period Nonlinear Congruential Generators Derived From the Rényi Chaotic Map , 2007, IEEE Transactions on Circuits and Systems I: Regular Papers.

[22]  Edward M. Reingold,et al.  Efficient generation of the binary reflected gray code and its applications , 1976, CACM.

[23]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[24]  Fouad Khelifi,et al.  Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.

[25]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[26]  V. Aslantaş,et al.  Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms , 2009 .

[27]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[28]  Vishal Monga,et al.  Image Authentication Under Geometric Attacks Via Structure Matching , 2005, 2005 IEEE International Conference on Multimedia and Expo.