Abstract
Multimedia hash is an effective solution to image authentication and tampering identification. We propose an image hashing scheme based on Low-Rank and Sparse Representation. Low-Rank Representation is applied to the attacked image to obtain image feature matrix and error matrix. Then the properties of dimension reduction and tampering recovery inherent in Low-Rank Representation and Compressive Sensing are exploited for hash design. We use Compressive Sensing to recover the primary feature of image. Furthermore we use Low-Rank Representation to recover the image from tampering. Thanks to the error correction and structure recover capabilities of Low-Rank Representation, experiments reveal that our proposed hashing scheme is robust to content preserving modifications and has better image recovery performance compared with existing hashing schemes.
Similar content being viewed by others
References
Candès E, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52(2):489–509
Candés EJ, Wakin MB (2008) An introduction to compressive sampling: a sensing/sampling paradigm that goes against the common knowledge in data acquisition. IEEE Signal Process 25(2):21–30
CASIA-Tampered Image Detection Database, Available online: http://forensics.idealtest.org/
Cox IJ, Miller ML, Bloom JA (2001) Digital watermarking. Morgan Kaufmann Publishers Inc., San Francisco
Donoho DL (2006) Compressive sensing. IEEE Trans Inf Theory 52:1289–1306
Figueiredo MAT, Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: application to compressed sensing and other inverse problems. IEEE J Sel Top Sign Process 1(4):586–597
Gerold L, Andreas U (2008) Key-dependent JPEG2000-based robust hashing for secure image authentication. EURASIP J Inf Secur 8(1):1–19
Kailasanathan C, Naini RS (2001) Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation. In: Proc IEEE-EURASIP Work. Nonlinear Sig. Image
Kailasanathan C, Naini RS, Ogunbona P (2003) Compression tolerant DCT based image hash. In: Proceedings of International Conference on Distributed Computing Systems, pp 562–567
Kozat SS, Venkatesan R, Mihcak MK (2004) Robust perceptual image hashing via matrix invariants. In: Proc IEEE Intl Conf Image Process pp 3443–3446
Liu G, Lin Z, Yan S, Sun J, Yu Y, Ma Y (2013) Robust recovery of subspace structures by low-rank representation. IEEE Trans Pattern Anal Mach Intell 35:171–184
Liu G, Lin Z, Yu Y (2010) Robust subspace segmentation by low-rank representation. International Conference Machine Learning, In, pp 663–670
Liu G, Yan S (2012) Active subspace: towards scalable low-rank learning. Neural Comput 24(12):3371–3394
Lv XD, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7(3):1081–1093
Monga V, Mihcak MK (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans Inf Forensics Secur 2(3):376–390
Rachlin Y, Baron D (2008) The secrecy of compressed sensing measurements, In: Proc. 46th Annual Allerton Conf. Comm. Control Comput, pp 813–817
Seo JS, Haitsma J, Kalker T, Yoo CD (2004) A robust image fingerprinting system using the radon transform. Signal Process Image Commun 19(4):325–339
Sun R, Zeng WJ (2014) Secure and robust image hashing via compressive sensing. Multimed Tools Appl 70:1651–1665
Swaminathan A, Mao YN, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 1(2):215–230
Tagliasacchi M, Valenzise G, Tubaro S (2009) Hash-based identification of sparse image tampering. IEEE Trans Image Process 18(11):2491–2504
Venkatesan R, Koon S-M, Jakubowski MH, Moulin P (2000) Robust image hashing. In: Proceedings IEEE International Conference on Image Processing (ICIP), Vol. 3, pp 664–666
Xiao D, Deng MM, Zhu XY (2014) A reversible image authentication scheme based on compressive sensing. Multimed Tools Appl. doi:10.1007/s11042-014-2017-z
Zhou NR, Zhang AD, Wu JH, Pei DJ, Yang YX (2014) Novel hybrid image compression-encryption algorithm based on compressive sensing. Optik 125(18):5075–5080
Zhou NR, Zhang AD, Zheng F, Gong LH (2014) Image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152–160
Acknowledgments
The work was supported by Chongqing Youth Innovative Talent Project (Grant No. cstc2013kjrc-qnrc40004), the open research fund of Chongqing Key Laboratory of Emergency Communications (Grant No. CQKLEC, 20140504), Project Nos. 106112013CDJZR180005, 106112014CDJZR185501, XDJK2015C077 supported by the Fundamental Research Funds for the Central Universities, the Natural Science Foundation of Chongqing Science and Technology Commission (Grant Nos. cstc2013jcyjA40017, cstc2013jjB40009) and the National Natural Science Foundation of China (Grant Nos. 61173178, 61272043, 61302161, 61472464).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, H., Xiao, D., Xiao, Y. et al. Robust image hashing with tampering recovery capability via low-rank and sparse representation. Multimed Tools Appl 75, 7681–7696 (2016). https://doi.org/10.1007/s11042-015-2688-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2688-0