Skip to main content
Log in

LWT-DCT based image hashing for image authentication via blind geometric correction

  • 1187: Recent Advances in Multimedia Information Security: Cryptography and Steganography
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image authentication based on robust image hashing has been paid large attention by researchers. However, most of the existing methods are unable to authenticate, if the image is processed through geometric transformations and tampered. In this paper, we have proposed a blind geometric correction approach, which eliminates the effect of geometric transformation, including rotation-scaling-translation (RST). We have incorporated Lifting Wavelet Transform (LWT) and Discrete Cosine Transform (DCT) to construct a short hash. Furthermore, an algorithm to generate an image map from the hash is proposed to detect the tampered regions. The main objective is to keep the hash length short with better performance, i.e., perceptually robust to content-preserving operations and image tampering detection. Based on the difference of image maps obtained from “source image” and “query images”, tampering regions have been localized. The proposed method can detect tampering, even if tampering and composite RST geometric transformations occur simultaneously, due to blind geometric correction. The experimental results show that the proposed image authentication method outperforms the state-of-the-art techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Ahmed N, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE Trans Comput 100(1):90–93

    Article  MathSciNet  MATH  Google Scholar 

  2. Ahmed F, Siyal MY, Abbas (2010) A secure and robust hash based scheme for image authentication. Sig Process 90(5):1456–1470

    Article  MATH  Google Scholar 

  3. Battiato S, Farinella GM, Messina E, Puglisi G (2012) Robust image alignment for tampering detection. IEEE Trans Inf Forensics Secur 7(4):1105–1117

    Article  Google Scholar 

  4. Brian K, Grauman K (2009) Kernelized locality-sensitive hashing for scalable image search. In: IEEE International Conference on Computer Vision, pp 2130–2137

  5. CASIA Tampered image detection evaluation database [Online]. Available: http://forensics.idealtest.org/. Accessed 2010

  6. Connolly C, Fliess T (1997) A study of efficiency and accuracy in the transformation from RGB to CIE Lab color space. IEEE Trans Image Process 6(7):1046–1048

    Article  Google Scholar 

  7. Daubechies I, Sweldens W (1998) Factoring wavelet transforms into lifting steps. J Fourier Anal Appl 4(3):247–269

    Article  MathSciNet  MATH  Google Scholar 

  8. Davarzani R, Mozaffari S, Yaghmaie K (2016) Perceptual image hashing using center-symmetric local binary patterns. Multimed Tools Appl 75(8):4639–4667

    Article  Google Scholar 

  9. Du L, Chen Z, Ho AT (2020) Binary multi-view perceptual hashing for image authentication. Multimed Tools Appl 19:1–23

    Google Scholar 

  10. Ground Truth Database. http://www.cs.washington.edu/research/imagedatabase/groundtruth/. Accessed 8 May 2008

  11. Hosny KM, Khedr YM, Khedr WI, Mohamed ER (2018) Robust color image hashing using quaternion polar complex exponential transform for image authentication. Circuits Syst Signal Process 37(12):5441–5462

    Article  Google Scholar 

  12. Karsh RK, Laskar RH (2017) Robust image hashing through DWTSVD and spectral residual method. EURASIP J Image Video Process 2017(1):31

    Article  Google Scholar 

  13. Karsh RK, Laskar RH, Richhariya BB (2016) Robust image hashing using ring partition-PGNMF and local features. Springerplus 5(1):1995

    Article  Google Scholar 

  14. Karsh RK, Saikia A, Laskar RH (2018) Image authentication based on robust image hashing with geometric correction. Multimed Tools Appl 77(19):25409–25429

    Article  Google Scholar 

  15. Lei Y, Wang Y, Huang J (2011) Robust image hash in radon transform domain for authentication. Signal Process Image Commun 26:280–288

    Article  Google Scholar 

  16. Leng L, Zhang J (2013) Palmhash code vs. palmphasor code. Neurocomputing 108:1–2

    Article  Google Scholar 

  17. Leng L, Li M, Teoh AB (2013) Conjugate 2DPalmHash code for secure palm-print-vein verification. In: IEEE International Congress on Image and Signal Processing, pp 1705–1710

  18. Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554

    Google Scholar 

  19. Lv X, Wang ZV (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7(3):1081–1093

    Article  Google Scholar 

  20. Lu W, Wu M (2010) Multimedia forensic hash based on visual words. In: IEEE International Conference on Image Processing, pp 989–992

  21. Lu W, Varna AL, Wu M (2010) Forensic hash for multimedia information. In: Proc SPIE Media Forensics and Security, pp 75410Y

  22. Mishra M, Adhikary MC (2013) Digital image tamper detection techniques: A comprehensive study. Int J Comput Sci Bus Inf 2(1):1–12

    Google Scholar 

  23. Ouyang J, Liu Y, Shu H (2017) Robust hashing for image authentication using SIFT feature and quaternion Zernike moments. Multimed Tools Appl 76(2):2609–2626

    Article  Google Scholar 

  24. Paul M, Karsh RK, Talukdar FA (2019) Image hashing based on shape context and Speeded Up Robust Features (SURF). In: IEEE International Conference on Automation, Computational and Technology Management, pp 464–468

  25. Pun CM, Yan CP, Yuan (2016) Image alignment-based multi region matching for object-level tampering detection. IEEE Trans Inf Forensics Secur 12(2):377–391

    Article  Google Scholar 

  26. Reddy S, Arya U, Karsh U, Laskar RK (2020) Hash code based image authentication using rotation invariant local phase quantization. In: Elçi A, Sa P, Modi C, Olague G, Sahoo M, Bakshi S (eds) Smart computing paradigms: New progresses and challenges. Advances in intelligent systems and computing, vol 766. Springer, Singapore

    Google Scholar 

  27. Roy S, Sun Q (2007) Robust hash for detecting and localizing image tampering. In: IEEE International Conference on Image Processing, pp VI-117

  28. Saikia A, Karsh RK, Lashkar RH (2017) Image authentication under geometric attacks via concentric square partition based image hashing. In: TENCON 2017 IEEE Region 10 Conference, pp 2214–2219

  29. Sajjad M, Haq IU, Lloret J, Ding W, Muhammad K (2019) Robust image hashing based efficient authentication for smart industrial environment. IEEE Trans Industr Inf 15(12):6541–6550

    Article  Google Scholar 

  30. Su Z, Yao L, Mei J, Zhou L, Li W (2020) Learning to hash for personalized image authentication. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2020.3002146

  31. Tang Z, Zhang X, Li X, Zhang S (2016) Robust image hashing with ring partition and invariant vector distance. IEEE Trans Inf Forensics Secur 11(1):200–214

    Article  Google Scholar 

  32. USC-SIPI Image database. http://sipi.usc.edu/database/. Accessed Feb 2007

  33. Venkatesan R, Koon SM, Jakubowski MH, Moulin P (2000) Robust image hashing. In: IEEE International Conference on Image Processing, pp 664–666

  34. Yan CP, Pun CM (2017) Multi-scale difference map fusion for tamper localization using binary ranking hashing. IEEE Trans Inf Forensics Secur 12(9):2144–2158

    Article  Google Scholar 

  35. Yan CP, Pun CM, Yuan XC (2016) Quaternion-based image hashing for adaptive tampering localization. IEEE Trans Inf Forensics Secur 11(12):2664–2677

    Article  Google Scholar 

  36. Yan CP, Pun CM, Yuan XC (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Sig Process 121:1–16

    Article  Google Scholar 

  37. Yunchao G, Lazebnik S, Gordo A, Perronnin F (2013) Iterative quantization: A procrustean approach to learning binary codes for large-scale image retrieval. IEEE Trans Pattern Anal Mach Intell 35(12):2916–2929

    Article  Google Scholar 

  38. Zhao Y, Wang S, Zhang X, Yao H (2013) Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Secur 8(1):55–63

    Article  Google Scholar 

Download references

Acknowledgements

The author would like to thank all the Ph.D. scholars of Speech and Image Processing Laboratory and National Institute of Technology Silchar, India, for offering help and vital facilities for doing this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ram Kumar Karsh.

Ethics declarations

Conflicts of interest/Competing interest

There is no conflicts of interest.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix 1 DCT matrix

figure e

where \({\mathbf{T}}(u,v)\) has been obtained as \({\mathbf{T}}\left(u,v\right)=\left\{\begin{array}{*{20}c}\sqrt{1/m}\quad\ ; u=0 and 0\le v\le m-1 \\ \sqrt{2/m} cos\left[\frac{\left(2v+1\right)\pi u}{2 m}\right] ;1\le u\le m-1 and 0\le v\le m-1\end{array}\right.\)

Appendix 2 Zigzag ordering and invers-ordering

Fig. 9
figure 9

Diagram of zigzag scanning

The zigzag order is obtainedas per arrow direction shown in Fig. 9, given below.

figure f

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Karsh, R.K. LWT-DCT based image hashing for image authentication via blind geometric correction. Multimed Tools Appl 82, 22083–22101 (2023). https://doi.org/10.1007/s11042-022-13349-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13349-2

Keywords

Navigation