Abstract
This paper presents a perceptual image hashing algorithm based on wave atom transform, which can authenticate the content preserved images and distinguish the content altered ones in authentication module. Wave atoms are employed since it has significantly sparser expansion and better feature extraction capability than traditional transforms, like wavelet and DCT. In addition, a randomized pixel modulation based on RC4 algorithm is performed to ensure the security. According to the experimental results, the proposed scheme is sensitive to content-alteration attacks with the resiliency to contentpreserving operations, such as JPEG compression, Gaussian noise and contrast enhancement. Moreover, compared with some other image hashing algorithms, the proposed approach also achieves better performance at the aspect of robustness.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Applied Cryptography. John Wiley & Sons, Inc., USA (1996)
Schneider, M., Chang, S.F.: A robust content-based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, vol. 3, pp. 227–230 (1996)
Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proc. IEEE Int. Conf. Image Processing, Vancouver, BC, Canada, vol. 3, pp. 664–666 (2000)
Kailasanathan, C., Naini, R.S., Ogunbona, P.: Image authentication surviving acceptable modifications. In: Proc. IEEE-EURASIP Workshop on Nonlinear Signal Image Processing, Baltimore, MD (2001)
Lin, C.Y., Chang, S.F.: A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Trans. on Circuits and Systems for Video Technology 11(2), 153–168 (2001)
Lu, C.S., Liao, H.Y.M.: Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multimedia 5(2), 161–173 (2003)
Bhattacharjee, S., Kutter, M.: Compression tolerant image authentication. In: Proc. International Conference on Image Processing, Chicago, USA, vol. 1(7), pp. 435–438 (1998)
Monga, V., Evans, B.L.: Perceptual image hashing via feature points: Performance evaluation and tradeoffs. IEEE Trans. Image Process. 15(11), 3452–3465 (2006)
Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proc. IEEE Int. Conf. Information Technology: Coding and Computing, Las Vegas, NV, pp. 178–183 (2000)
Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forens. Sec. 1(2), 215–230 (2006)
Monga, V., Mihcak, M.K.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forens. Sec. 2(3), 376–390 (2007)
Demanet, L., Ying, L.: Wave atoms and sparsity of oscillatory patterns. Applied and Computational Harmonic Analysis 23(3), 368–387 (2007)
Mallat, S.: A Wavelet Tour of Signal Processing, 2nd edn. Academic Press, Orlando (1999)
Antoine, J.P., Murenzi, R.: Two-dimensional directional wavelets and the scale-angle representation. Signal Processing 52, 259–281 (1996)
Leung, H.Y., Cheng, L.M.: Robust watermarking scheme using wave atoms. EURASIP Journal on Advances in Signal Processing 2011, Article ID 184817, 9 pages (2011), doi:10.1155/2011/184817
Ahmed, F., Siyal, M.Y., Vali, U.A.: A secure and robust hash-based scheme for image authentication. Signal Processing 90(5), 1456–1470 (2010)
Guo, X.C., Hatzinakos, D.: Content Based Image Hashing Via Wavelet and Radon Transform. In: Ip, H.H.-S., Au, O.C., Leung, H., Sun, M.-T., Ma, W.-Y., Hu, S.-M. (eds.) PCM 2007. LNCS, vol. 4810, pp. 755–764. Springer, Heidelberg (2007)
Seo, J.S., Haitsma, J., Kalker, T., Yoo, C.D.: A robust image fingerprinting system using the rado transform. Signal Processing: Image Communication 19(4), 325–339 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, F., Cheng, LM. (2012). Perceptual Image Hashing via Wave Atom Transform. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_37
Download citation
DOI: https://doi.org/10.1007/978-3-642-32205-1_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32204-4
Online ISBN: 978-3-642-32205-1
eBook Packages: Computer ScienceComputer Science (R0)