Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 288))

  • 2220 Accesses

Abstract

In this paper, a fine-grained authentication model for remote sensing image based on perceptual hashing and grid descriptor is proposed. Most perceptual hashing algorithms generate the hash value from an image’s global features, while remote sensing images are generally of huge amount and large size, so they are not suitable for remote sensing images authentication applications with high security demand. In this work, we apply grid descriptor to divide a remote sensing image, then generate the perceptual hash value of each region, and organize these hash values by embedding them into the corresponding region with watermarking technique. The grid descriptor is applied to detect and represent the tamper of the image. Compared with other authentication algorithms, the model can authentically remote sense image with different granularity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schneider M, Chang SF (1996) A robust content based digital signature for image authentication. Proc IEEE Int Conf Image Process 3:227–230

    Article  Google Scholar 

  2. Chang L, Yan WG, Wang WD (2012) Research on robust image perceptual hashing technology based on discrete cosine transform. In: Business, Economics, Financial Sciences, and Management. Springer, Berlin, Heidelberg, pp 799–809

    Google Scholar 

  3. Christophe D, Delaigle J, Macq B (2002) Invisibility and application functionalities in perceptual watermarking: an overview. Proc IEEE 90(1):64–77

    Google Scholar 

  4. Zhang D, Lu G (2004) Review of shape representation and description techniques. Pattern Recogn 37(1):1–19

    Article  MATH  Google Scholar 

  5. Lu G, Sajjanhar A (1999) Region-based shape representation and similarity measure suitable for content-based image retrieval. Multimedia Syst 7(2):165–174

    Article  Google Scholar 

  6. Menezes A, van Oorschot P, Vanstone S (1996) Handbook of applied cryptography. CRC Press, Boca Raton

    Book  Google Scholar 

  7. Cho SY, Han SY (2003) Wavelet packet based digital watermarking for remote sensing image compression. In: Computer and information sciences (ISCIS 2003). Springer, Berlin, Heidelberg, pp 482–489

    Google Scholar 

Download references

Acknowledgments

This research is supported by the National Natural Science Foundation of China, No. 41071245; Research and Innovation Project for Graduates of Jiangsu Higher Education Institutions (CXLX13_378).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kaimeng Ding .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ding, K., Wang, Y. (2014). A Fine-Grained Authentication Model Based on Perceptual Hashing and Grid Descriptor for Remote Sensing Image. In: Jia, L., Liu, Z., Qin, Y., Zhao, M., Diao, L. (eds) Proceedings of the 2013 International Conference on Electrical and Information Technologies for Rail Transportation (EITRT2013)-Volume II. Lecture Notes in Electrical Engineering, vol 288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53751-6_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-53751-6_45

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-53750-9

  • Online ISBN: 978-3-642-53751-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics