Quaternion-Based Image Hashing for Adaptive Tampering Localization

Image-hashing-based tampering detection methods have been widely studied with continuous advancements. However, most of existing models are designed for a specific tampering. In this paper, we propose a novel quaternion-based image hashing to detect almost all types of tampering, including color changing, copy move, splicing, and so on. First, the quaternion Fourier-Mellin transform is used to calculate the geometric hash to eliminate the influence of geometric distortions. Then, a new quaternion image construction method, which combines advantages of both color and structural features, is proposed to implement the quaternion Fourier transform to calculate the image feature hash to locate the tampered regions. The objective is to provide a reasonably short image hashing with good performance, i.e., being perceptually robust against various content-preserving attacks while capable of detecting and locating almost all types of tampering. Furthermore, an adaptive tampering localization algorithm is proposed based on clustering analysis to improve the detection accuracy. The experimental results show that the proposed tampering detection model outperforms the existing state-of-the-art models and is very robust against various content-preserving attacks.

[1]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[2]  Giovanni Maria Farinella,et al.  Robust Image Alignment for Tampering Detection , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Qibin Sun,et al.  Robust Hash for Detecting and Localizing Image Tampering , 2007, 2007 IEEE International Conference on Image Processing.

[4]  Frédo Durand,et al.  A Fast Approximation of the Bilateral Filter Using a Signal Processing Approach , 2006, International Journal of Computer Vision.

[5]  Vishal Monga,et al.  Image Authentication Under Geometric Attacks Via Structure Matching , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[6]  Min Wu,et al.  Forensic hash for multimedia information , 2010, Electronic Imaging.

[7]  H. Arsenault,et al.  Experiments on pattern recognition using invariant Fourier-Mellin descriptors. , 1986, Journal of the Optical Society of America. A, Optics and image science.

[8]  Liming Zhang,et al.  Spatio-temporal Saliency detection using phase spectrum of quaternion fourier transform , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[9]  Roberto Manduchi,et al.  Bilateral filtering for gray and color images , 1998, Sixth International Conference on Computer Vision (IEEE Cat. No.98CH36271).

[10]  Chi-Man Pun,et al.  Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..

[11]  Jintao Li,et al.  Binary feature from intensity quantization and weakly spatial contextual coding for image search , 2015, Inf. Sci..

[12]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[13]  Sajal K. Das,et al.  Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach , 2008 .

[14]  M. C. Adhikary,et al.  Digital Image Tamper Detection Techniques - A Comprehensive Study , 2013, ArXiv.

[15]  Xinpeng Zhang,et al.  Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .

[16]  Alexei A. Efros,et al.  Fast bilateral filtering for the display of high-dynamic-range images , 2002 .

[17]  Xinpeng Zhang,et al.  Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.

[18]  Z. Jane Wang,et al.  Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.

[19]  Ming Zhu,et al.  Quaternion Fourier-Mellin moments for color images , 2011, Pattern Recognit..

[20]  Martin D. Levine,et al.  Visual Saliency Based on Scale-Space Analysis in the Frequency Domain , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[21]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[22]  Min Wu,et al.  Multimedia forensic hash based on visual words , 2010, 2010 IEEE International Conference on Image Processing.

[23]  Jianru Xue,et al.  A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Ming Zhu,et al.  Quaternion moment and its invariants for color object classification , 2014, Inf. Sci..

[25]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[26]  Hefei Ling,et al.  Nonnegative sparse locality preserving hashing , 2014, Inf. Sci..

[27]  Stephen J. Sangwine,et al.  Hypercomplex Fourier Transforms of Color Images , 2001, IEEE Transactions on Image Processing.