Fourier-Mellin transform for Robust Image Hashing

This paper proposes a new perceptual image hashing technique based on the Fourier-Mellin Transform (FMT). The idea consists of exploiting the invariance property of the FMT to extract robust hashes using overlapping blocks in the transform domain. To secure the system, two secrete keys are used in different stages. The results show good robustness against signal processing operations and geometric attacks including translation and rotation and demonstrate the superiority of the proposed technique over related transform based hashing techniques.

[1]  Chang Dong Yoo,et al.  Robust video fingerprinting for content-based video identification , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[3]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[4]  Z. Jane Wang,et al.  Perceptual Image Hashing Based on Shape Contexts and Local Feature Points , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Fouad Khelifi,et al.  Sub-images based image hashing with non-negative factorization , 2012, 2012 19th IEEE International Conference on Electronics, Circuits, and Systems (ICECS 2012).

[6]  Fouad Khelifi,et al.  Analysis of the Security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization , 2010, IEEE Signal Processing Letters.

[7]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[8]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[9]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[11]  Fouad Khelifi,et al.  Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.