TY - JOUR
T1 - Robust image hashing using progressive feature selection for tampering detection
AU - Pun, Chi Man
AU - Yan, Cai Ping
AU - Yuan, Xiao Chen
N1 - Publisher Copyright:
© 2017, Springer Science+Business Media New York.
PY - 2018/5/1
Y1 - 2018/5/1
N2 - The main problem addressed in this paper is the robust tamper detection of the image received in a transmission under various content-preserving attacks. To this aim the progressive feature point selection method is proposed to extract the feature points of high robustness; with which, the local feature and color feature are then generated for each feature point. Afterwards, the robust image hashing construction method is proposed by using the location-context information of the features. The constructed hash is attached to the image before transmission and it can be used for analyzing at destination to filter out the geometric transformations occurred in the received image. After image restoration, the similarity of the global hashes between the source image and restored image is calculated to determine whether the received image has the same contents as the trusted one or has been maliciously tampered. When the received image being judged as a tampered image, the hashes calculated with the proposed Horizontal Location-Context Hashing (HLCH) and Vertical Location-Context Hashing (VLCH) methods will be used to locate the tampered regions. Experimental results on different images with tampering of arbitrary size and location demonstrate that our image authentication and tampering localization scheme are superior to the state-of-the-art methods under various attacks.
AB - The main problem addressed in this paper is the robust tamper detection of the image received in a transmission under various content-preserving attacks. To this aim the progressive feature point selection method is proposed to extract the feature points of high robustness; with which, the local feature and color feature are then generated for each feature point. Afterwards, the robust image hashing construction method is proposed by using the location-context information of the features. The constructed hash is attached to the image before transmission and it can be used for analyzing at destination to filter out the geometric transformations occurred in the received image. After image restoration, the similarity of the global hashes between the source image and restored image is calculated to determine whether the received image has the same contents as the trusted one or has been maliciously tampered. When the received image being judged as a tampered image, the hashes calculated with the proposed Horizontal Location-Context Hashing (HLCH) and Vertical Location-Context Hashing (VLCH) methods will be used to locate the tampered regions. Experimental results on different images with tampering of arbitrary size and location demonstrate that our image authentication and tampering localization scheme are superior to the state-of-the-art methods under various attacks.
KW - Horizontal location-context hashing (HLCH)
KW - Image authentication
KW - Progressive feature point selection
KW - Robust image hashing
KW - Tampering detection
KW - Vertical location-context hashing (VLCH)
UR - https://www.scopus.com/pages/publications/85020116262
U2 - 10.1007/s11042-017-4809-4
DO - 10.1007/s11042-017-4809-4
M3 - Article
AN - SCOPUS:85020116262
SN - 1380-7501
VL - 77
SP - 11609
EP - 11633
JO - Multimedia Tools and Applications
JF - Multimedia Tools and Applications
IS - 10
ER -