Abstract
Image authentication based on robust image hashing has been paid large attention by researchers. However, most of the existing methods are unable to authenticate, if the image is processed through geometric transformations and tampered. In this paper, we have proposed a blind geometric correction approach, which eliminates the effect of geometric transformation, including rotation-scaling-translation (RST). We have incorporated Lifting Wavelet Transform (LWT) and Discrete Cosine Transform (DCT) to construct a short hash. Furthermore, an algorithm to generate an image map from the hash is proposed to detect the tampered regions. The main objective is to keep the hash length short with better performance, i.e., perceptually robust to content-preserving operations and image tampering detection. Based on the difference of image maps obtained from “source image” and “query images”, tampering regions have been localized. The proposed method can detect tampering, even if tampering and composite RST geometric transformations occur simultaneously, due to blind geometric correction. The experimental results show that the proposed image authentication method outperforms the state-of-the-art techniques.
Similar content being viewed by others
References
Ahmed N, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE Trans Comput 100(1):90–93
Ahmed F, Siyal MY, Abbas (2010) A secure and robust hash based scheme for image authentication. Sig Process 90(5):1456–1470
Battiato S, Farinella GM, Messina E, Puglisi G (2012) Robust image alignment for tampering detection. IEEE Trans Inf Forensics Secur 7(4):1105–1117
Brian K, Grauman K (2009) Kernelized locality-sensitive hashing for scalable image search. In: IEEE International Conference on Computer Vision, pp 2130–2137
CASIA Tampered image detection evaluation database [Online]. Available: http://forensics.idealtest.org/. Accessed 2010
Connolly C, Fliess T (1997) A study of efficiency and accuracy in the transformation from RGB to CIE Lab color space. IEEE Trans Image Process 6(7):1046–1048
Daubechies I, Sweldens W (1998) Factoring wavelet transforms into lifting steps. J Fourier Anal Appl 4(3):247–269
Davarzani R, Mozaffari S, Yaghmaie K (2016) Perceptual image hashing using center-symmetric local binary patterns. Multimed Tools Appl 75(8):4639–4667
Du L, Chen Z, Ho AT (2020) Binary multi-view perceptual hashing for image authentication. Multimed Tools Appl 19:1–23
Ground Truth Database. http://www.cs.washington.edu/research/imagedatabase/groundtruth/. Accessed 8 May 2008
Hosny KM, Khedr YM, Khedr WI, Mohamed ER (2018) Robust color image hashing using quaternion polar complex exponential transform for image authentication. Circuits Syst Signal Process 37(12):5441–5462
Karsh RK, Laskar RH (2017) Robust image hashing through DWTSVD and spectral residual method. EURASIP J Image Video Process 2017(1):31
Karsh RK, Laskar RH, Richhariya BB (2016) Robust image hashing using ring partition-PGNMF and local features. Springerplus 5(1):1995
Karsh RK, Saikia A, Laskar RH (2018) Image authentication based on robust image hashing with geometric correction. Multimed Tools Appl 77(19):25409–25429
Lei Y, Wang Y, Huang J (2011) Robust image hash in radon transform domain for authentication. Signal Process Image Commun 26:280–288
Leng L, Zhang J (2013) Palmhash code vs. palmphasor code. Neurocomputing 108:1–2
Leng L, Li M, Teoh AB (2013) Conjugate 2DPalmHash code for secure palm-print-vein verification. In: IEEE International Congress on Image and Signal Processing, pp 1705–1710
Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554
Lv X, Wang ZV (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7(3):1081–1093
Lu W, Wu M (2010) Multimedia forensic hash based on visual words. In: IEEE International Conference on Image Processing, pp 989–992
Lu W, Varna AL, Wu M (2010) Forensic hash for multimedia information. In: Proc SPIE Media Forensics and Security, pp 75410Y
Mishra M, Adhikary MC (2013) Digital image tamper detection techniques: A comprehensive study. Int J Comput Sci Bus Inf 2(1):1–12
Ouyang J, Liu Y, Shu H (2017) Robust hashing for image authentication using SIFT feature and quaternion Zernike moments. Multimed Tools Appl 76(2):2609–2626
Paul M, Karsh RK, Talukdar FA (2019) Image hashing based on shape context and Speeded Up Robust Features (SURF). In: IEEE International Conference on Automation, Computational and Technology Management, pp 464–468
Pun CM, Yan CP, Yuan (2016) Image alignment-based multi region matching for object-level tampering detection. IEEE Trans Inf Forensics Secur 12(2):377–391
Reddy S, Arya U, Karsh U, Laskar RK (2020) Hash code based image authentication using rotation invariant local phase quantization. In: Elçi A, Sa P, Modi C, Olague G, Sahoo M, Bakshi S (eds) Smart computing paradigms: New progresses and challenges. Advances in intelligent systems and computing, vol 766. Springer, Singapore
Roy S, Sun Q (2007) Robust hash for detecting and localizing image tampering. In: IEEE International Conference on Image Processing, pp VI-117
Saikia A, Karsh RK, Lashkar RH (2017) Image authentication under geometric attacks via concentric square partition based image hashing. In: TENCON 2017 IEEE Region 10 Conference, pp 2214–2219
Sajjad M, Haq IU, Lloret J, Ding W, Muhammad K (2019) Robust image hashing based efficient authentication for smart industrial environment. IEEE Trans Industr Inf 15(12):6541–6550
Su Z, Yao L, Mei J, Zhou L, Li W (2020) Learning to hash for personalized image authentication. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2020.3002146
Tang Z, Zhang X, Li X, Zhang S (2016) Robust image hashing with ring partition and invariant vector distance. IEEE Trans Inf Forensics Secur 11(1):200–214
USC-SIPI Image database. http://sipi.usc.edu/database/. Accessed Feb 2007
Venkatesan R, Koon SM, Jakubowski MH, Moulin P (2000) Robust image hashing. In: IEEE International Conference on Image Processing, pp 664–666
Yan CP, Pun CM (2017) Multi-scale difference map fusion for tamper localization using binary ranking hashing. IEEE Trans Inf Forensics Secur 12(9):2144–2158
Yan CP, Pun CM, Yuan XC (2016) Quaternion-based image hashing for adaptive tampering localization. IEEE Trans Inf Forensics Secur 11(12):2664–2677
Yan CP, Pun CM, Yuan XC (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Sig Process 121:1–16
Yunchao G, Lazebnik S, Gordo A, Perronnin F (2013) Iterative quantization: A procrustean approach to learning binary codes for large-scale image retrieval. IEEE Trans Pattern Anal Mach Intell 35(12):2916–2929
Zhao Y, Wang S, Zhang X, Yao H (2013) Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Secur 8(1):55–63
Acknowledgements
The author would like to thank all the Ph.D. scholars of Speech and Image Processing Laboratory and National Institute of Technology Silchar, India, for offering help and vital facilities for doing this work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest/Competing interest
There is no conflicts of interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix 1 DCT matrix
where \({\mathbf{T}}(u,v)\) has been obtained as \({\mathbf{T}}\left(u,v\right)=\left\{\begin{array}{*{20}c}\sqrt{1/m}\quad\ ; u=0 and 0\le v\le m-1 \\ \sqrt{2/m} cos\left[\frac{\left(2v+1\right)\pi u}{2 m}\right] ;1\le u\le m-1 and 0\le v\le m-1\end{array}\right.\)
Appendix 2 Zigzag ordering and invers-ordering
The zigzag order is obtainedas per arrow direction shown in Fig. 9, given below.
Rights and permissions
About this article
Cite this article
Karsh, R.K. LWT-DCT based image hashing for image authentication via blind geometric correction. Multimed Tools Appl 82, 22083–22101 (2023). https://doi.org/10.1007/s11042-022-13349-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13349-2