Skip to main content

Perceptual Image Hashing via Wave Atom Transform

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7128))

Abstract

This paper presents a perceptual image hashing algorithm based on wave atom transform, which can authenticate the content preserved images and distinguish the content altered ones in authentication module. Wave atoms are employed since it has significantly sparser expansion and better feature extraction capability than traditional transforms, like wavelet and DCT. In addition, a randomized pixel modulation based on RC4 algorithm is performed to ensure the security. According to the experimental results, the proposed scheme is sensitive to content-alteration attacks with the resiliency to contentpreserving operations, such as JPEG compression, Gaussian noise and contrast enhancement. Moreover, compared with some other image hashing algorithms, the proposed approach also achieves better performance at the aspect of robustness.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Applied Cryptography. John Wiley & Sons, Inc., USA (1996)

    Google Scholar 

  2. Schneider, M., Chang, S.F.: A robust content-based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, vol. 3, pp. 227–230 (1996)

    Google Scholar 

  3. Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proc. IEEE Int. Conf. Image Processing, Vancouver, BC, Canada, vol. 3, pp. 664–666 (2000)

    Google Scholar 

  4. Kailasanathan, C., Naini, R.S., Ogunbona, P.: Image authentication surviving acceptable modifications. In: Proc. IEEE-EURASIP Workshop on Nonlinear Signal Image Processing, Baltimore, MD (2001)

    Google Scholar 

  5. Lin, C.Y., Chang, S.F.: A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Trans. on Circuits and Systems for Video Technology 11(2), 153–168 (2001)

    Article  MathSciNet  Google Scholar 

  6. Lu, C.S., Liao, H.Y.M.: Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multimedia 5(2), 161–173 (2003)

    Article  MathSciNet  Google Scholar 

  7. Bhattacharjee, S., Kutter, M.: Compression tolerant image authentication. In: Proc. International Conference on Image Processing, Chicago, USA, vol. 1(7), pp. 435–438 (1998)

    Google Scholar 

  8. Monga, V., Evans, B.L.: Perceptual image hashing via feature points: Performance evaluation and tradeoffs. IEEE Trans. Image Process. 15(11), 3452–3465 (2006)

    Article  Google Scholar 

  9. Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proc. IEEE Int. Conf. Information Technology: Coding and Computing, Las Vegas, NV, pp. 178–183 (2000)

    Google Scholar 

  10. Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forens. Sec. 1(2), 215–230 (2006)

    Article  Google Scholar 

  11. Monga, V., Mihcak, M.K.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forens. Sec. 2(3), 376–390 (2007)

    Article  Google Scholar 

  12. Demanet, L., Ying, L.: Wave atoms and sparsity of oscillatory patterns. Applied and Computational Harmonic Analysis 23(3), 368–387 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  13. Mallat, S.: A Wavelet Tour of Signal Processing, 2nd edn. Academic Press, Orlando (1999)

    MATH  Google Scholar 

  14. Antoine, J.P., Murenzi, R.: Two-dimensional directional wavelets and the scale-angle representation. Signal Processing 52, 259–281 (1996)

    Article  MATH  Google Scholar 

  15. Leung, H.Y., Cheng, L.M.: Robust watermarking scheme using wave atoms. EURASIP Journal on Advances in Signal Processing 2011, Article ID 184817, 9 pages (2011), doi:10.1155/2011/184817

    Google Scholar 

  16. Ahmed, F., Siyal, M.Y., Vali, U.A.: A secure and robust hash-based scheme for image authentication. Signal Processing 90(5), 1456–1470 (2010)

    Article  MATH  Google Scholar 

  17. Guo, X.C., Hatzinakos, D.: Content Based Image Hashing Via Wavelet and Radon Transform. In: Ip, H.H.-S., Au, O.C., Leung, H., Sun, M.-T., Ma, W.-Y., Hu, S.-M. (eds.) PCM 2007. LNCS, vol. 4810, pp. 755–764. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  18. Seo, J.S., Haitsma, J., Kalker, T., Yoo, C.D.: A robust image fingerprinting system using the rado transform. Signal Processing: Image Communication 19(4), 325–339 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, F., Cheng, LM. (2012). Perceptual Image Hashing via Wave Atom Transform. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32205-1_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32204-4

  • Online ISBN: 978-3-642-32205-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics