Skip to main content

Memoryless Hash-Based Perceptual Image Authentication

  • Conference paper
The International Workshop on Digital Forensics and Watermarking 2012 (IWDW 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7809))

Included in the following conference series:

  • 2065 Accesses

Abstract

It is well known that the rapid development of multimedia technologies has led to a huge growth of image editing tools. The popularity of image editing tools has further resulted in the growth of image illegal utilization. Unlike the traditional information authentication, perceptual image hashing approaches are recently proposed for content-based image authentication, which can distinguish maliciously altered images from the perceptually identical ones. However, these approaches need some other information to achieve the authentication, such as the hash codes of original images. Semi-fragile watermarking is also presented to deal with content-based authentication; however this approach focuses more on some specific aspect of robustness, for example JEPG compression. Hence, to avoid extra information storage and simultaneously achieve a global robustness against common image processing manipulations, this paper presents a memoryless hash-based perceptual image authentication algorithm using joint image hashing and watermarking method upon wave atom transform. Experimental results have demonstrated that the proposed algorithm possesses great robustness against common non-malicious manipulations and still keeps high sensitivity to malicious attacks. It can also provide perceptual image authentication successfully without any other information, even the hash codes of original images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneider, M., Chang, S.F.: A robust content-based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, vol. 3, pp. 227–230 (1996)

    Google Scholar 

  2. Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proc. IEEE Int. Conf. Image Processing, Vancouver, BC, Canada, vol. 3, pp. 664–666 (2000)

    Google Scholar 

  3. Kailasanathan, C., Naini, R.S., Ogunbona, P.: Image authentication surviving acceptable modifications. In: Proc. IEEE-EURASIP Workshop on Nonlinear Signal Image Processing, Baltimore, MD (2001)

    Google Scholar 

  4. Lin, C.Y., Chang, S.F.: A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Trans. on Circuits and Systems for Video Technology 11, 153–168 (2001)

    Article  Google Scholar 

  5. Lu, C.S., Liao, H.Y.M.: Structural digital signature for image authentication. IEEE Trans. Multimedia 5, 161–173 (2003)

    Article  Google Scholar 

  6. Bhattacharjee, S., Kutter, M.: Compression tolerant image authentication. In: Proc. International Conference on Image Processing, Chicago, USA, vol. 4, pp. 435–438 (1998)

    Google Scholar 

  7. Monga, V., Evans, B.L.: Perceptual image hashing via feature points: Performance evaluation and tradeoffs. IEEE Trans. Image Process. 15, 3452–3465 (2006)

    Article  Google Scholar 

  8. Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proc. IEEE Int. Conf. Information Technology: Coding and Computing, Las Vegas, NV, USA, pp. 178–183 (2000)

    Google Scholar 

  9. Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forens. Sec. 1, 215–230 (2006)

    Article  Google Scholar 

  10. Monga, V., Mihcak, M.K.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forens. Sec. 2, 376–390 (2007)

    Article  Google Scholar 

  11. Lin, C.Y., Chang, S.F.: Semi-fragile watermarking for authenticating JPEG visual content. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, pp. 140–151 (2000)

    Google Scholar 

  12. Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of image alterations using semi-fragile watermarks. In: Proc. SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, CA, USA, pp. 152–163 (2000)

    Google Scholar 

  13. Maeno, K., Sun, Q.B., Chang, S.F., Suto, M.: New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans. Multimedia 8, 32–45 (2006)

    Article  Google Scholar 

  14. Zhang, D.X., Pan, Z.G., Li, H.H.: A Contour-based Semifragile Image Watermarking Algorithm in DWT Domain. In: Second International Workshop on Education Technology and Computer Science, Wuhan, pp. 228–231 (2010)

    Google Scholar 

  15. Yu, G., Lu, C., Liao, H.: Mean quantization-based fragile watermarking for image authentication. Opt. Eng. 40, 1396–1408 (2001)

    Article  Google Scholar 

  16. Zhu, Y., Li, C., Zhao, H.: Structural digital signature and semi-fragile fingerprinting for image authentication in wavelet domain. In: Proc. IAS, Manchester, pp. 478–483 (2007)

    Google Scholar 

  17. Cruz, C., Reyes, R., Nakano, M., Perez, H.: Image content authentication system based on semi-fragile watermarking. In: Proc. the 51st Midwest Symposium on Circuits and Systems, Knoxville, TN, pp. 306–309 (2008)

    Google Scholar 

  18. Demanet, L., Ying, L.: Wave atoms and sparsity of oscillatory patterns. Appl. Comput. Harmon. Anal. 23(3), 368–387 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  19. Liu, F., Cheng, L.M.: A Novel Image Hashing Scheme Base on Wave Atoms. In: Proc. IEEE International Conference on IIH-MSP, Dalian, pp. 125–128 (2011)

    Google Scholar 

  20. Addabbo, T., Alioto, M., Fort, A., Pasini, A., Rocchi, S., Vignoli, V.: A Class of Maximum-Period Nonlinear Congruential Generators Derived From the Rényi Chaotic Map. IEEE Trans. Circuits Syst. I, Reg. Papers 54(4), 816–828 (2007)

    Article  MathSciNet  Google Scholar 

  21. Lin, S., Costello, D.J.: Error Control Coding, 2nd edn. Prentice Hall, Inc., Upper Saddle River (2004)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, F., Fu, QK., Cheng, LM. (2013). Memoryless Hash-Based Perceptual Image Authentication. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40099-5_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40098-8

  • Online ISBN: 978-3-642-40099-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics