Geometrically robust image hashing scheme for image authentication

In this paper, a geometrically robust image hashing scheme based on Polar Complex Exponential Transform(PCET) is proposed. The reported scheme enhances visual image with the response values of SUSAN detector, then performs PCET on the enhanced image to get the moment features which have rotation and scaling invariance. And then the moment features are processed by the rules, derived from SFFS feature selection method, to obtain the intermediate hash. Finally, the intermediate hash is quantized as the final image hash bits with the deterministic adaptive quantizer. Experimental results show that this scheme can tolerate most of the typical image processing manipulations, such as JPEG compression, geometric distortion, blur, addition of noise, and enhancement. Compared with other approaches in literatures, our method is more effective for image authentication in terms of small tampering detection.

[1]  Vishal Monga,et al.  A clustering based approach to perceptual image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[2]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[3]  Josef Kittler,et al.  Floating search methods in feature selection , 1994, Pattern Recognit. Lett..

[4]  N. K. Kamila,et al.  Invariance image analysis using modified Zernike moments , 2005, Pattern Recognit. Lett..

[5]  Xudong Jiang,et al.  Two-Dimensional Polar Harmonic Transforms for Invariant Image Representation , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Jiwu Huang,et al.  Histogram-based image hashing scheme robust against geometric deformations , 2007, MM&Sec.

[7]  Benoit M. Macq,et al.  A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[8]  Jean-Didier Legat,et al.  RASH: RAdon soft hash algorithm , 2002, 2002 11th European Signal Processing Conference.

[9]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[10]  Yanqiang Lei,et al.  Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..

[11]  S. M. Steve SUSAN - a new approach to low level image processing , 1997 .

[12]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[13]  Raveendran Paramesran,et al.  Efficient computation of radial moment functions using symmetrical property , 2006, Pattern Recognit..

[14]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.