Abstract
The main problem addressed in this paper is the robust tamper detection of the image received in a transmission under various content-preserving attacks. To this aim the progressive feature point selection method is proposed to extract the feature points of high robustness; with which, the local feature and color feature are then generated for each feature point. Afterwards, the robust image hashing construction method is proposed by using the location-context information of the features. The constructed hash is attached to the image before transmission and it can be used for analyzing at destination to filter out the geometric transformations occurred in the received image. After image restoration, the similarity of the global hashes between the source image and restored image is calculated to determine whether the received image has the same contents as the trusted one or has been maliciously tampered. When the received image being judged as a tampered image, the hashes calculated with the proposed Horizontal Location-Context Hashing (HLCH) and Vertical Location-Context Hashing (VLCH) methods will be used to locate the tampered regions. Experimental results on different images with tampering of arbitrary size and location demonstrate that our image authentication and tampering localization scheme are superior to the state-of-the-art methods under various attacks.
Similar content being viewed by others
References
Available from: http://umacweb.umac.mo/new_campus_project/chi/construction/, in
Ahmed F, Siyal MY, Uddin Abbas V (2010) A secure and robust hash-based scheme for image authentication. Signal Process 90:1456–1470
Battiato S, Farinella GM, Messina E, Puglisi G (2012) Robust image alignment for tampering detection. IEEE Transactions on Information Forensics and Security 7:1105–1117
Bay H, Ess A, Tuytelaars T, Gool LV (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110:346–359
Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214:33–43
Cheung Y-m, Wu H-T (2007) A sequential quantization strategy for data embedding and integrity verification. IEEE Transactions on Circuits and Systems for Video Technology 17:1007–1016
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6:1673–1687
Deng C, Gao X, Li X, Tao D (2009) A local Tchebichef moments-based robust image watermarking. Signal Process 89:1531–1539
Gao X, Deng C, Li X, Tao D (2010) Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern Part C Appl Rev 40:278–286
Harris C, Stephens M (1988) A Combined Corner and Edge Detection, in: Proceedings of The Fourth Alvey Vision Conference, pp 147–151
Jegou H, Douze M, Schmid C, Available from: http://lear.inrialpes.fr/~jegou/data.php#holidays, in
Lee J-C, Chang C-P, Chen W-K (2015) Detection of copy–move image forgery using histogram of orientated gradients. Inf Sci 321:250–262
Lefebvre F, Czyz J, Macq B (2003) A robust soft hash algorithm for digital image signature, in: 2003 International Conference Proceedings on Image Processing, ICIP 2003, 493: pp II-495-498
Liang R-Z, Shi L, Wang H, Meng J, Wang JJ-Y, Sun Q, Gu Y (2016) Optimizing Top Precision Performance Measure of Content-Based Image Retrieval by Learning Similarity Function, in: Pattern Recognition (ICPR), 2016 IEEE
Lowe DG (2004) Distinctive image features from scale-invariant Keypoints. Int J Comput Vis 60:91–110
Lu W, Varna AL, Wu M (2010) Forensic hash for multimedia information. Proceedings of the SPIE, Media Forensics and Security II 7541:75410
Lu W, Wu M (2010) Multimedia forensic hash based on visual words, in: Image Processing (ICIP), 2010 17th IEEE International Conference on, pp 989–992
Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Transactions on Information Forensics and Security 7:1081–1093
Mikolajczyk K, Schmid C (2002) An affine invariant interest point detector. In: Heyden A, Sparr G, Nielsen M, Johansen P (eds) Computer vision — ECCV 2002. Springer, Berlin Heidelberg, pp 128–142
Mishra M, Adhikary FLDMC (2013) Digital image tamper detection techniques: a comprehensive study. International Journal of Computer Science and Business Informatics 2:1–12
Monga V, Evans BL (2006) Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Process 15:3452–3465
Monga V, Mıhçak MK (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Transactions on Information Forensics and Security 2:376–390
Swaminathan A, Mao Y, Min W (2006) Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1:215–230
Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using non-negative matrix factorization. Journal of ubiquitous convergence technology 2:18–26
Tuytelaars T, Mikolajczyk K (2008) Local invariant feature detectors: a survey. Foundations and Trends in Computer Graphics and Vision 3:177–280
Venkatesan R, Koon SM, Jakubowski MH, Moulin P (2000) Robust image hashing, in: Proceedings on International Conference on Image Processing 2000, ICIP, 663: pp 664–666
Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE Transactions on Information Forensics and Security 10:1336–1349
Weinberger K, Dasgupta A, Langford J, Smola A, Attenberg J (2009) Feature hashing for large scale multitask learning, in: Proceedings of the 26th Annual International Conference on Machine Learning, ACM, Montreal, Quebec, Canada, pp 1113–1120
Yan C-P, Pun C-M, Yuan X-C (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Process 121:1–16
Zhang W, Liu Y, Das SK, De P (2008) Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach. Pervasive and Mobile Computing 4:658–680
Zhao Y, Wang S, Zhang X, Yao H (2013) Robust hashing for image authentication using Zernike moments and local features. IEEE Transactions on Information Forensics and Security 8:55–63
Zhuang D, Zhang D, Li J, Tian Q (2015) Binary feature from intensity quantization and weakly spatial contextual coding for image search. Inf Sci 302:94–107
Acknowledgements
This research was supported in part by the Research Committee of the University of Macau (MYRG2015-00011-FST, MYRG2015-00012-FST) and the Science and Technology Development Fund of Macau SAR (093-2014-A2).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Pun, CM., Yan, CP. & Yuan, XC. Robust image hashing using progressive feature selection for tampering detection. Multimed Tools Appl 77, 11609–11633 (2018). https://doi.org/10.1007/s11042-017-4809-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4809-4