Skip to main content
Log in

Robust image hashing with tampering recovery capability via low-rank and sparse representation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Multimedia hash is an effective solution to image authentication and tampering identification. We propose an image hashing scheme based on Low-Rank and Sparse Representation. Low-Rank Representation is applied to the attacked image to obtain image feature matrix and error matrix. Then the properties of dimension reduction and tampering recovery inherent in Low-Rank Representation and Compressive Sensing are exploited for hash design. We use Compressive Sensing to recover the primary feature of image. Furthermore we use Low-Rank Representation to recover the image from tampering. Thanks to the error correction and structure recover capabilities of Low-Rank Representation, experiments reveal that our proposed hashing scheme is robust to content preserving modifications and has better image recovery performance compared with existing hashing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Candès E, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52(2):489–509

    Article  MathSciNet  MATH  Google Scholar 

  2. Candés EJ, Wakin MB (2008) An introduction to compressive sampling: a sensing/sampling paradigm that goes against the common knowledge in data acquisition. IEEE Signal Process 25(2):21–30

    Article  Google Scholar 

  3. CASIA-Tampered Image Detection Database, Available online: http://forensics.idealtest.org/

  4. Cox IJ, Miller ML, Bloom JA (2001) Digital watermarking. Morgan Kaufmann Publishers Inc., San Francisco

    Google Scholar 

  5. Donoho DL (2006) Compressive sensing. IEEE Trans Inf Theory 52:1289–1306

    Article  MathSciNet  MATH  Google Scholar 

  6. Figueiredo MAT, Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: application to compressed sensing and other inverse problems. IEEE J Sel Top Sign Process 1(4):586–597

    Article  Google Scholar 

  7. Gerold L, Andreas U (2008) Key-dependent JPEG2000-based robust hashing for secure image authentication. EURASIP J Inf Secur 8(1):1–19

    Google Scholar 

  8. Kailasanathan C, Naini RS (2001) Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation. In: Proc IEEE-EURASIP Work. Nonlinear Sig. Image

  9. Kailasanathan C, Naini RS, Ogunbona P (2003) Compression tolerant DCT based image hash. In: Proceedings of International Conference on Distributed Computing Systems, pp 562–567

  10. Kozat SS, Venkatesan R, Mihcak MK (2004) Robust perceptual image hashing via matrix invariants. In: Proc IEEE Intl Conf Image Process pp 3443–3446

  11. Liu G, Lin Z, Yan S, Sun J, Yu Y, Ma Y (2013) Robust recovery of subspace structures by low-rank representation. IEEE Trans Pattern Anal Mach Intell 35:171–184

    Article  Google Scholar 

  12. Liu G, Lin Z, Yu Y (2010) Robust subspace segmentation by low-rank representation. International Conference Machine Learning, In, pp 663–670

    Google Scholar 

  13. Liu G, Yan S (2012) Active subspace: towards scalable low-rank learning. Neural Comput 24(12):3371–3394

    Article  MathSciNet  MATH  Google Scholar 

  14. Lv XD, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7(3):1081–1093

    Article  Google Scholar 

  15. Monga V, Mihcak MK (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans Inf Forensics Secur 2(3):376–390

    Article  Google Scholar 

  16. Rachlin Y, Baron D (2008) The secrecy of compressed sensing measurements, In: Proc. 46th Annual Allerton Conf. Comm. Control Comput, pp 813–817

  17. Seo JS, Haitsma J, Kalker T, Yoo CD (2004) A robust image fingerprinting system using the radon transform. Signal Process Image Commun 19(4):325–339

    Article  Google Scholar 

  18. Sun R, Zeng WJ (2014) Secure and robust image hashing via compressive sensing. Multimed Tools Appl 70:1651–1665

    Article  Google Scholar 

  19. Swaminathan A, Mao YN, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 1(2):215–230

    Article  Google Scholar 

  20. Tagliasacchi M, Valenzise G, Tubaro S (2009) Hash-based identification of sparse image tampering. IEEE Trans Image Process 18(11):2491–2504

    Article  MathSciNet  Google Scholar 

  21. Venkatesan R, Koon S-M, Jakubowski MH, Moulin P (2000) Robust image hashing. In: Proceedings IEEE International Conference on Image Processing (ICIP), Vol. 3, pp 664–666

  22. Xiao D, Deng MM, Zhu XY (2014) A reversible image authentication scheme based on compressive sensing. Multimed Tools Appl. doi:10.1007/s11042-014-2017-z

    Google Scholar 

  23. Zhou NR, Zhang AD, Wu JH, Pei DJ, Yang YX (2014) Novel hybrid image compression-encryption algorithm based on compressive sensing. Optik 125(18):5075–5080

    Article  Google Scholar 

  24. Zhou NR, Zhang AD, Zheng F, Gong LH (2014) Image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152–160

    Article  Google Scholar 

Download references

Acknowledgments

The work was supported by Chongqing Youth Innovative Talent Project (Grant No. cstc2013kjrc-qnrc40004), the open research fund of Chongqing Key Laboratory of Emergency Communications (Grant No. CQKLEC, 20140504), Project Nos. 106112013CDJZR180005, 106112014CDJZR185501, XDJK2015C077 supported by the Fundamental Research Funds for the Central Universities, the Natural Science Foundation of Chongqing Science and Technology Commission (Grant Nos. cstc2013jcyjA40017, cstc2013jjB40009) and the National Natural Science Foundation of China (Grant Nos. 61173178, 61272043, 61302161, 61472464).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Di Xiao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, H., Xiao, D., Xiao, Y. et al. Robust image hashing with tampering recovery capability via low-rank and sparse representation. Multimed Tools Appl 75, 7681–7696 (2016). https://doi.org/10.1007/s11042-015-2688-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2688-0

Keywords

Navigation