Skip to main content
Log in

Robust image hashing using progressive feature selection for tampering detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The main problem addressed in this paper is the robust tamper detection of the image received in a transmission under various content-preserving attacks. To this aim the progressive feature point selection method is proposed to extract the feature points of high robustness; with which, the local feature and color feature are then generated for each feature point. Afterwards, the robust image hashing construction method is proposed by using the location-context information of the features. The constructed hash is attached to the image before transmission and it can be used for analyzing at destination to filter out the geometric transformations occurred in the received image. After image restoration, the similarity of the global hashes between the source image and restored image is calculated to determine whether the received image has the same contents as the trusted one or has been maliciously tampered. When the received image being judged as a tampered image, the hashes calculated with the proposed Horizontal Location-Context Hashing (HLCH) and Vertical Location-Context Hashing (VLCH) methods will be used to locate the tampered regions. Experimental results on different images with tampering of arbitrary size and location demonstrate that our image authentication and tampering localization scheme are superior to the state-of-the-art methods under various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Available from: http://umacweb.umac.mo/new_campus_project/chi/construction/, in

  2. Ahmed F, Siyal MY, Uddin Abbas V (2010) A secure and robust hash-based scheme for image authentication. Signal Process 90:1456–1470

    Article  MATH  Google Scholar 

  3. Battiato S, Farinella GM, Messina E, Puglisi G (2012) Robust image alignment for tampering detection. IEEE Transactions on Information Forensics and Security 7:1105–1117

    Article  Google Scholar 

  4. Bay H, Ess A, Tuytelaars T, Gool LV (2008) Speeded-up robust features (SURF). Comput Vis Image Underst 110:346–359

    Article  Google Scholar 

  5. Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214:33–43

    Article  Google Scholar 

  6. Cheung Y-m, Wu H-T (2007) A sequential quantization strategy for data embedding and integrity verification. IEEE Transactions on Circuits and Systems for Video Technology 17:1007–1016

    Article  Google Scholar 

  7. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6:1673–1687

    Article  Google Scholar 

  8. Deng C, Gao X, Li X, Tao D (2009) A local Tchebichef moments-based robust image watermarking. Signal Process 89:1531–1539

    Article  MATH  Google Scholar 

  9. Gao X, Deng C, Li X, Tao D (2010) Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern Part C Appl Rev 40:278–286

  10. Harris C, Stephens M (1988) A Combined Corner and Edge Detection, in: Proceedings of The Fourth Alvey Vision Conference, pp 147–151

  11. Jegou H, Douze M, Schmid C, Available from: http://lear.inrialpes.fr/~jegou/data.php#holidays, in

  12. Lee J-C, Chang C-P, Chen W-K (2015) Detection of copy–move image forgery using histogram of orientated gradients. Inf Sci 321:250–262

    Article  Google Scholar 

  13. Lefebvre F, Czyz J, Macq B (2003) A robust soft hash algorithm for digital image signature, in: 2003 International Conference Proceedings on Image Processing, ICIP 2003, 493: pp II-495-498

  14. Liang R-Z, Shi L, Wang H, Meng J, Wang JJ-Y, Sun Q, Gu Y (2016) Optimizing Top Precision Performance Measure of Content-Based Image Retrieval by Learning Similarity Function, in: Pattern Recognition (ICPR), 2016 IEEE

  15. Lowe DG (2004) Distinctive image features from scale-invariant Keypoints. Int J Comput Vis 60:91–110

    Article  Google Scholar 

  16. Lu W, Varna AL, Wu M (2010) Forensic hash for multimedia information. Proceedings of the SPIE, Media Forensics and Security II 7541:75410

    Google Scholar 

  17. Lu W, Wu M (2010) Multimedia forensic hash based on visual words, in: Image Processing (ICIP), 2010 17th IEEE International Conference on, pp 989–992

  18. Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Transactions on Information Forensics and Security 7:1081–1093

    Article  Google Scholar 

  19. Mikolajczyk K, Schmid C (2002) An affine invariant interest point detector. In: Heyden A, Sparr G, Nielsen M, Johansen P (eds) Computer vision — ECCV 2002. Springer, Berlin Heidelberg, pp 128–142

    Chapter  Google Scholar 

  20. Mishra M, Adhikary FLDMC (2013) Digital image tamper detection techniques: a comprehensive study. International Journal of Computer Science and Business Informatics 2:1–12

    Google Scholar 

  21. Monga V, Evans BL (2006) Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Process 15:3452–3465

    Article  Google Scholar 

  22. Monga V, Mıhçak MK (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Transactions on Information Forensics and Security 2:376–390

    Article  Google Scholar 

  23. Swaminathan A, Mao Y, Min W (2006) Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1:215–230

    Article  Google Scholar 

  24. Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using non-negative matrix factorization. Journal of ubiquitous convergence technology 2:18–26

    Google Scholar 

  25. Tuytelaars T, Mikolajczyk K (2008) Local invariant feature detectors: a survey. Foundations and Trends in Computer Graphics and Vision 3:177–280

    Article  Google Scholar 

  26. Venkatesan R, Koon SM, Jakubowski MH, Moulin P (2000) Robust image hashing, in: Proceedings on International Conference on Image Processing 2000, ICIP, 663: pp 664–666

  27. Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE Transactions on Information Forensics and Security 10:1336–1349

    Article  Google Scholar 

  28. Weinberger K, Dasgupta A, Langford J, Smola A, Attenberg J (2009) Feature hashing for large scale multitask learning, in: Proceedings of the 26th Annual International Conference on Machine Learning, ACM, Montreal, Quebec, Canada, pp 1113–1120

  29. Yan C-P, Pun C-M, Yuan X-C (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Process 121:1–16

    Article  Google Scholar 

  30. Zhang W, Liu Y, Das SK, De P (2008) Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach. Pervasive and Mobile Computing 4:658–680

    Article  Google Scholar 

  31. Zhao Y, Wang S, Zhang X, Yao H (2013) Robust hashing for image authentication using Zernike moments and local features. IEEE Transactions on Information Forensics and Security 8:55–63

    Article  Google Scholar 

  32. Zhuang D, Zhang D, Li J, Tian Q (2015) Binary feature from intensity quantization and weakly spatial contextual coding for image search. Inf Sci 302:94–107

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported in part by the Research Committee of the University of Macau (MYRG2015-00011-FST, MYRG2015-00012-FST) and the Science and Technology Development Fund of Macau SAR (093-2014-A2).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi-Man Pun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pun, CM., Yan, CP. & Yuan, XC. Robust image hashing using progressive feature selection for tampering detection. Multimed Tools Appl 77, 11609–11633 (2018). https://doi.org/10.1007/s11042-017-4809-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4809-4

Keywords

Navigation