Skip to main content

A Secure Image Hashing Technique for Forgery Detection

  • Conference paper
  • 2168 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8956))

Abstract

Nowadays most of the multimedia contents are in digital form. With the increased use of powerful computer and image processing software, along with wide availability of digital cameras have given rise to huge numbers of doctored images. Several forgery detection algorithms are available. However, these techniques do not address the issue from cryptographic point of view. As a result, even if an image or video is identified as doctored, most of the time it is not possible to track the actual offender. Here, we present a perceptual hash function which can be used for both detection of forged images as well as tracking of forgers.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: A survey. Digital Investigation 10(3), 226–245 (2013)

    Article  Google Scholar 

  2. Goldfarb, B.: Digital deception, http://brucegoldfarb.com/larrysface/deception.shtml (accessed on June 2014)

  3. Gray, F.: Pulse code communication. U.S. Patent 2,632,058; (filed on November 13, 1947) (issued March 17, 1953)

    Google Scholar 

  4. Kailasanathan, C., Naini, R.S., Ogunbona, P.: Image authentication surviving acceptable modifications. In: Proc. of IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing, Baltimore, MD (2001)

    Google Scholar 

  5. Sencar, H.T., Memon, N.: Overview of state-of-the-art in digital image forensics. In: Indian Statistical Institute Platinum Jubilee Monograph series titled ‘Statistical Science and Interdisciplinary Research’, pp. 325–348. World Scientific Press (2008)

    Google Scholar 

  6. Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1(2), 215–230 (2006)

    Article  Google Scholar 

  7. Vetterli, M., Kovacevic, J.: Wavelets and subband coding. Prentice-Hall (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Das, T.K., Bhunre, P.K. (2015). A Secure Image Hashing Technique for Forgery Detection. In: Natarajan, R., Barua, G., Patra, M.R. (eds) Distributed Computing and Internet Technology. ICDCIT 2015. Lecture Notes in Computer Science, vol 8956. Springer, Cham. https://doi.org/10.1007/978-3-319-14977-6_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14977-6_34

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14976-9

  • Online ISBN: 978-3-319-14977-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics