Hash-Based Identification of Sparse Image Tampering

In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents has not been adequately balanced by similar advances in protecting these contents from unauthorized diffusion of forged copies. When the goal is to detect whether or not a digital content has been tampered with in order to alter its semantics, the use of multimedia hashes turns out to be an effective solution to offer proof of legitimacy and to possibly identify the introduced tampering. We propose an image hashing algorithm based on compressive sensing principles, which solves both the authentication and the tampering identification problems. The original content producer generates a hash using a small bit budget by quantizing a limited number of random projections of the authentic image. The content user receives the (possibly altered) image and uses the hash to estimate the mean square error distortion between the original and the received image. In addition, if the introduced tampering is sparse in some orthonormal basis or redundant dictionary, an approximation is given in the pixel domain. We emphasize that the hash is universal, e.g., the same hash signature can be used to detect and identify different types of tampering. At the cost of additional complexity at the decoder, the proposed algorithm is robust to moderate content-preserving transformations including cropping, scaling, and rotation. In addition, in order to keep the size of the hash small, hash encoding/decoding takes advantage of distributed source codes.

[1]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[2]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[3]  Bruno O. Shubert,et al.  Random variables and stochastic processes , 1979 .

[4]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[5]  Bernd Girod,et al.  Rate-adaptive codes for distributed source coding , 2006, Signal Process..

[6]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[7]  Shih-Kun Huang,et al.  Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..

[8]  Vishal Monga,et al.  Image Authentication Under Geometric Attacks Via Structure Matching , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[9]  Kannan Ramchandran,et al.  Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[10]  Hany Farid,et al.  Exposing Digital Forgeries Through Specular Highlights on the Eye , 2007, Information Hiding.

[11]  Aaron D. Wyner,et al.  The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.

[12]  J. Wolfowitz The rate distortion function for source coding with side information at the decoder , 1979 .

[13]  Bernd Girod,et al.  Distributed Video Coding , 2005, Proceedings of the IEEE.

[14]  Qibin Sun,et al.  Robust Hash for Detecting and Localizing Image Tampering , 2007, 2007 IEEE International Conference on Image Processing.

[15]  Robert D. Nowak,et al.  Signal Reconstruction From Noisy Random Projections , 2006, IEEE Transactions on Information Theory.

[16]  Bernd Girod,et al.  Image Authentication Based on Distributed Source Coding , 2007, 2007 IEEE International Conference on Image Processing.

[17]  Richard G. Baraniuk,et al.  Multiscale Random Projections for Compressive Classification , 2007, 2007 IEEE International Conference on Image Processing.

[18]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[19]  Stefano Tubaro,et al.  Rate allocation for robust video streaming based on distributed video coding , 2008, Signal Process. Image Commun..

[20]  E.J. Candes Compressive Sampling , 2022 .

[21]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[22]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[23]  Stephen P. Boyd,et al.  Enhancing Sparsity by Reweighted ℓ1 Minimization , 2007, 0711.1612.

[24]  I. Miller Probability, Random Variables, and Stochastic Processes , 1966 .

[25]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[26]  Guillermo Sapiro,et al.  Image inpainting , 2000, SIGGRAPH.

[27]  Hany Farid,et al.  Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.

[28]  Bernd Girod,et al.  Spatial models for localization of image tampering using distributed source codes , 2007, PCS 2007.

[29]  Hany Farid,et al.  Detecting Photographic Composites of People , 2008, IWDW.

[30]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[31]  Bernd Girod,et al.  Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[32]  Hany Farid,et al.  Exposing digital forgeries in scientific images , 2006, MM&Sec '06.

[33]  Richard G. Baraniuk,et al.  Detection and estimation with compressive measurements , 2006 .

[34]  E. Berg,et al.  In Pursuit of a Root , 2007 .

[35]  Pierre Vandergheynst,et al.  Compressed Sensing and Redundant Dictionaries , 2007, IEEE Transactions on Information Theory.

[36]  Richard G. Baraniuk,et al.  The smashed filter for compressive classification and target recognition , 2007, Electronic Imaging.

[37]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[38]  Terence Tao,et al.  The Dantzig selector: Statistical estimation when P is much larger than n , 2005, math/0506081.

[39]  Michael B. Wakin,et al.  An Introduction To Compressive Sampling [A sensing/sampling paradigm that goes against the common knowledge in data acquisition] , 2008 .

[40]  Allen Gersho,et al.  Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.

[41]  Marco Dalai,et al.  The DISCOVER codec: Architecture, Techniques and Evaluation , 2007, PCS 2007.

[42]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.