Abstract
It is well known that the rapid development of multimedia technologies has led to a huge growth of image editing tools. The popularity of image editing tools has further resulted in the growth of image illegal utilization. Unlike the traditional information authentication, perceptual image hashing approaches are recently proposed for content-based image authentication, which can distinguish maliciously altered images from the perceptually identical ones. However, these approaches need some other information to achieve the authentication, such as the hash codes of original images. Semi-fragile watermarking is also presented to deal with content-based authentication; however this approach focuses more on some specific aspect of robustness, for example JEPG compression. Hence, to avoid extra information storage and simultaneously achieve a global robustness against common image processing manipulations, this paper presents a memoryless hash-based perceptual image authentication algorithm using joint image hashing and watermarking method upon wave atom transform. Experimental results have demonstrated that the proposed algorithm possesses great robustness against common non-malicious manipulations and still keeps high sensitivity to malicious attacks. It can also provide perceptual image authentication successfully without any other information, even the hash codes of original images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schneider, M., Chang, S.F.: A robust content-based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, vol. 3, pp. 227–230 (1996)
Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proc. IEEE Int. Conf. Image Processing, Vancouver, BC, Canada, vol. 3, pp. 664–666 (2000)
Kailasanathan, C., Naini, R.S., Ogunbona, P.: Image authentication surviving acceptable modifications. In: Proc. IEEE-EURASIP Workshop on Nonlinear Signal Image Processing, Baltimore, MD (2001)
Lin, C.Y., Chang, S.F.: A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Trans. on Circuits and Systems for Video Technology 11, 153–168 (2001)
Lu, C.S., Liao, H.Y.M.: Structural digital signature for image authentication. IEEE Trans. Multimedia 5, 161–173 (2003)
Bhattacharjee, S., Kutter, M.: Compression tolerant image authentication. In: Proc. International Conference on Image Processing, Chicago, USA, vol. 4, pp. 435–438 (1998)
Monga, V., Evans, B.L.: Perceptual image hashing via feature points: Performance evaluation and tradeoffs. IEEE Trans. Image Process. 15, 3452–3465 (2006)
Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proc. IEEE Int. Conf. Information Technology: Coding and Computing, Las Vegas, NV, USA, pp. 178–183 (2000)
Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forens. Sec. 1, 215–230 (2006)
Monga, V., Mihcak, M.K.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forens. Sec. 2, 376–390 (2007)
Lin, C.Y., Chang, S.F.: Semi-fragile watermarking for authenticating JPEG visual content. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, pp. 140–151 (2000)
Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of image alterations using semi-fragile watermarks. In: Proc. SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, CA, USA, pp. 152–163 (2000)
Maeno, K., Sun, Q.B., Chang, S.F., Suto, M.: New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans. Multimedia 8, 32–45 (2006)
Zhang, D.X., Pan, Z.G., Li, H.H.: A Contour-based Semifragile Image Watermarking Algorithm in DWT Domain. In: Second International Workshop on Education Technology and Computer Science, Wuhan, pp. 228–231 (2010)
Yu, G., Lu, C., Liao, H.: Mean quantization-based fragile watermarking for image authentication. Opt. Eng. 40, 1396–1408 (2001)
Zhu, Y., Li, C., Zhao, H.: Structural digital signature and semi-fragile fingerprinting for image authentication in wavelet domain. In: Proc. IAS, Manchester, pp. 478–483 (2007)
Cruz, C., Reyes, R., Nakano, M., Perez, H.: Image content authentication system based on semi-fragile watermarking. In: Proc. the 51st Midwest Symposium on Circuits and Systems, Knoxville, TN, pp. 306–309 (2008)
Demanet, L., Ying, L.: Wave atoms and sparsity of oscillatory patterns. Appl. Comput. Harmon. Anal. 23(3), 368–387 (2007)
Liu, F., Cheng, L.M.: A Novel Image Hashing Scheme Base on Wave Atoms. In: Proc. IEEE International Conference on IIH-MSP, Dalian, pp. 125–128 (2011)
Addabbo, T., Alioto, M., Fort, A., Pasini, A., Rocchi, S., Vignoli, V.: A Class of Maximum-Period Nonlinear Congruential Generators Derived From the Rényi Chaotic Map. IEEE Trans. Circuits Syst. I, Reg. Papers 54(4), 816–828 (2007)
Lin, S., Costello, D.J.: Error Control Coding, 2nd edn. Prentice Hall, Inc., Upper Saddle River (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, F., Fu, QK., Cheng, LM. (2013). Memoryless Hash-Based Perceptual Image Authentication. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)