Skip to main content

Robust Image Hashing Technique for Content Authentication based on DWT

  • Conference paper
  • First Online:
Proceedings of International Conference on Computer Vision and Image Processing

Abstract

This paper presents an image hashing technique for content verification using Discrete Wavelet Transform (DWT) approximation features. The proposed technique converts resized RGB color images to L * a * b * color images. Further, images are regularized using Gaussian low pass filter. A level 2, 2D DWT is applied on L * component of L * a * b * color image and the LL 2 approximation sub-band image is chosen for feature extraction. The features are extracted by utilizing a sequence of circles on approximation sub-band image. Finally, the robust binary hash is generated from extracted features. The experimental results indicate that the hash of the presented technique is invariant to standard content preserving manipulations and malicious content altering operations. The experiment results of Receiver Operating Characteristics (ROC) plots indicate that the presented technique shows strong discriminative and robustness capabilities. Besides, the hash of the proposed technique is shorter in length and key dependent.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. M Saad, “Design of a Robust and Secure Digital Signature Scheme for Image Authentication over Wireless Channels,” IET Information Security, vol. 3(1), pp. 1–8, 2009.

    Google Scholar 

  2. Adil Haouzia, Rita Noumeir, “Methods for Image Authentication: A Survey,” Journal of Multimedia Tools Applications, vol. 39(1) pp. 1–4, 2008.

    Google Scholar 

  3. Shui-Hua Han, Chao-Hsien Chu, “Content-based Image Authentication: Current Status, Issues and Challenges,” Int. Journal of Information Security, vol. 9(1), pp. 19–32, 2010.

    Google Scholar 

  4. F Ahmed, M. Y. Siyal, V. Uddin Abbas, “A Secure and Robust Hash Based Scheme for Image Authentication,” Journal of Signal Processing, vol. 90(5), pp 1456–1470, 2010.

    Google Scholar 

  5. Zhenjun Tang et al., “Robust Image Hashing with Dominant DCT Coefficients,” Int. Journal for Light and Electron Optik, vol. 125(18), pp. 5102–5107, 2014.

    Google Scholar 

  6. Chuan Qin et al., “Robust Image Hashing using Non-uniform Sampling in Discrete Fourier Domain,” Journal of Digital Signal Processing, vol. 23(2), pp. 578–585, 2013.

    Google Scholar 

  7. Swaminathan A, Yinian Mao, Min Wu, “Robust and Secure Image Hashing,” IEEE Transactions on Information Forensics and Security, vol. 2(1), pp. 215–230, 2006.

    Google Scholar 

  8. V. Monga, M.K. Mhcak, “Robust and Secure Image Hashing via Non-Negative Matrix Factorization,” IEEE Tr. on Information Forensics and Security, vol. 2(3), pp. 376–390, 2007.

    Google Scholar 

  9. Yan Zhao, Shuozhong Wang, Xinpeng Zhang, and Heng Yao, “ Robust Hashing for Image Authentication using Zernike Moments and Local Features,” IEEE Tr. on Information Forensics and Security, vol. 8(1), pp. 55–63, 2013.

    Google Scholar 

  10. Zhenjun Tang et al., “Robust Image Hashing using Ring-based Entropies,” Journal of Signal Processing, vol. 93(7), pp. 2061–2069, 2013.

    Google Scholar 

  11. Lokanadham Naidu et al., “Robust Hash Generation Technique for Content Based Image Authentication using Histogram,” Multimedia Tools and Applications, vol. 74(9), 2015.

    Google Scholar 

  12. Patel Janak kumar et al., “Color Image Segmentation for Medical Images using L * a * b * Color Space,” Jr. of Electronics and Communication Engineering, vol. 1(2), pp. 24–45, 2012.

    Google Scholar 

  13. Joey Lott et al., “ActionScript 3.0 Cookbook,” O’Reilly, pp. 98–100, 2006.

    Google Scholar 

  14. Black, Paul E. (2005), Fisher-Yates Shuffle, “Dictionary of Algorithms and Data Structures,” National Institute of Standards and Technology, Retrieved 2007.

    Google Scholar 

  15. http://sipi.usc.edu/database/.

  16. http://decsai.ugr.es/cvg/dbimagenes/.

  17. http://tabby.vision.mcgill.ca/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lokanadham Naidu Vadlamudi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Vadlamudi, L.N., Vaddella, R.P.V., Devara, V. (2017). Robust Image Hashing Technique for Content Authentication based on DWT. In: Raman, B., Kumar, S., Roy, P., Sen, D. (eds) Proceedings of International Conference on Computer Vision and Image Processing. Advances in Intelligent Systems and Computing, vol 459. Springer, Singapore. https://doi.org/10.1007/978-981-10-2104-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2104-6_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2103-9

  • Online ISBN: 978-981-10-2104-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics