Image authentication based on robust image hashing with geometric correction

Image authentication based on robust image hashing has been widely discussed with continuous improvements. However, most of the existing methods misjudge the images processed through the geometric transformation and small malicious operations. In this paper, we have proposed a geometric correction approach, which eliminates the influence of geometric transformation, including composite rotation-scaling-translation (RST). We have incorporated the local features with global features to construct hash. The local features are extracted from the salient regions, which have been obtained using Markov absorption probabilities. The global features include statistical feature distance. While being robust to content-preserving operations (including the composite RST) the hash is sensitive to the small malicious operations, and hence may be used for image authentication. The proposed image authentication is a two-phase system. First, the threshold, δ, based on only global feature segregates between “different (also includes large area tampering) images” and “similar images or small tampered images”. In the next phase, the similar image pairs are authenticated and the tampered regions are localized, based on local features. The receiver operating characteristics shows that the proposed image authentication system outperforms some state-of-the-art methods.

[1]  Ram Kumar Karsh,et al.  Perceptual robust and secure image hashing using ring partition-PGNMF , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.

[2]  Jun Zhong,et al.  Towards unsupervised physical activity recognition using smartphone accelerometers , 2016, Multimedia Tools and Applications.

[3]  Ming Zhu,et al.  Quaternion Fourier-Mellin moments for color images , 2011, Pattern Recognit..

[4]  Chi-Man Pun,et al.  Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..

[5]  Li Liu,et al.  Recognizing Complex Activities by a Probabilistic Interval-Based Model , 2016, AAAI.

[6]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[7]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[8]  Zhenjun Tang,et al.  Robust image hashing using ring-based entropies , 2013, Signal Process..

[9]  Min Wu,et al.  Multimedia forensic hash based on visual words , 2010, 2010 IEEE International Conference on Image Processing.

[10]  Pascal Fua,et al.  SLIC Superpixels Compared to State-of-the-Art Superpixel Methods , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[11]  Chi-Man Pun,et al.  Quaternion-Based Image Hashing for Adaptive Tampering Localization , 2016, IEEE Transactions on Information Forensics and Security.

[12]  A. S. Solodovnikov,et al.  Hypercomplex Numbers: An Elementary Introduction to Algebras , 1989 .

[13]  Xinpeng Zhang,et al.  Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.

[14]  Z. Jane Wang,et al.  Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.

[15]  M. C. Adhikary,et al.  Digital Image Tamper Detection Techniques - A Comprehensive Study , 2013, ArXiv.

[16]  Xinpeng Zhang,et al.  Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization , 2008 .

[17]  Hongbin Zha,et al.  Fusion of low-and high-dimensional approaches by trackers sampling for generic human motion tracking , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).

[18]  David S. Rosenblum,et al.  From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.

[19]  Giovanni Maria Farinella,et al.  Robust Image Alignment for Tampering Detection , 2012, IEEE Transactions on Information Forensics and Security.

[20]  Aditi,et al.  Robust image hashing through DWT-SVD and spectral residual method , 2017, EURASIP Journal on Image and Video Processing.

[21]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[22]  Yanqiang Lei,et al.  Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..

[23]  Shichao Zhang,et al.  Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.

[24]  Jianru Xue,et al.  A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Luming Zhang,et al.  Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.

[26]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[27]  Min Wu,et al.  Forensic hash for multimedia information , 2010, Electronic Imaging.

[28]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[29]  Lyle H. Ungar,et al.  Beyond Binary Labels: Political Ideology Prediction of Twitter Users , 2017, ACL.

[30]  Hongbin Zha,et al.  Tracking Generic Human Motion via Fusion of Low- and High-Dimensional Approaches , 2013, IEEE Trans. Syst. Man Cybern. Syst..

[31]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[32]  Yu Zheng,et al.  Urban Water Quality Prediction Based on Multi-Task Multi-View Learning , 2016, IJCAI.

[33]  Luming Zhang,et al.  Fortune Teller: Predicting Your Career Path , 2016, AAAI.

[34]  Huazhong Shu,et al.  Robust hashing for image authentication using SIFT feature and quaternion Zernike moments , 2015, Multimedia Tools and Applications.

[35]  Huchuan Lu,et al.  Saliency Region Detection Based on Markov Absorption Probabilities , 2015, IEEE Transactions on Image Processing.

[36]  Ram Kumar Karsh,et al.  Robust image hashing using ring partition-PGNMF and local features , 2016, SpringerPlus.

[37]  Shichao Zhang,et al.  Robust Perceptual Image Hashing Based on Ring Partition and NMF , 2014, IEEE Transactions on Knowledge and Data Engineering.