Abstract
This paper presents an image hashing technique for content verification using Discrete Wavelet Transform (DWT) approximation features. The proposed technique converts resized RGB color images to L * a * b * color images. Further, images are regularized using Gaussian low pass filter. A level 2, 2D DWT is applied on L * component of L * a * b * color image and the LL 2 approximation sub-band image is chosen for feature extraction. The features are extracted by utilizing a sequence of circles on approximation sub-band image. Finally, the robust binary hash is generated from extracted features. The experimental results indicate that the hash of the presented technique is invariant to standard content preserving manipulations and malicious content altering operations. The experiment results of Receiver Operating Characteristics (ROC) plots indicate that the presented technique shows strong discriminative and robustness capabilities. Besides, the hash of the proposed technique is shorter in length and key dependent.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. M Saad, “Design of a Robust and Secure Digital Signature Scheme for Image Authentication over Wireless Channels,” IET Information Security, vol. 3(1), pp. 1–8, 2009.
Adil Haouzia, Rita Noumeir, “Methods for Image Authentication: A Survey,” Journal of Multimedia Tools Applications, vol. 39(1) pp. 1–4, 2008.
Shui-Hua Han, Chao-Hsien Chu, “Content-based Image Authentication: Current Status, Issues and Challenges,” Int. Journal of Information Security, vol. 9(1), pp. 19–32, 2010.
F Ahmed, M. Y. Siyal, V. Uddin Abbas, “A Secure and Robust Hash Based Scheme for Image Authentication,” Journal of Signal Processing, vol. 90(5), pp 1456–1470, 2010.
Zhenjun Tang et al., “Robust Image Hashing with Dominant DCT Coefficients,” Int. Journal for Light and Electron Optik, vol. 125(18), pp. 5102–5107, 2014.
Chuan Qin et al., “Robust Image Hashing using Non-uniform Sampling in Discrete Fourier Domain,” Journal of Digital Signal Processing, vol. 23(2), pp. 578–585, 2013.
Swaminathan A, Yinian Mao, Min Wu, “Robust and Secure Image Hashing,” IEEE Transactions on Information Forensics and Security, vol. 2(1), pp. 215–230, 2006.
V. Monga, M.K. Mhcak, “Robust and Secure Image Hashing via Non-Negative Matrix Factorization,” IEEE Tr. on Information Forensics and Security, vol. 2(3), pp. 376–390, 2007.
Yan Zhao, Shuozhong Wang, Xinpeng Zhang, and Heng Yao, “ Robust Hashing for Image Authentication using Zernike Moments and Local Features,” IEEE Tr. on Information Forensics and Security, vol. 8(1), pp. 55–63, 2013.
Zhenjun Tang et al., “Robust Image Hashing using Ring-based Entropies,” Journal of Signal Processing, vol. 93(7), pp. 2061–2069, 2013.
Lokanadham Naidu et al., “Robust Hash Generation Technique for Content Based Image Authentication using Histogram,” Multimedia Tools and Applications, vol. 74(9), 2015.
Patel Janak kumar et al., “Color Image Segmentation for Medical Images using L * a * b * Color Space,” Jr. of Electronics and Communication Engineering, vol. 1(2), pp. 24–45, 2012.
Joey Lott et al., “ActionScript 3.0 Cookbook,” O’Reilly, pp. 98–100, 2006.
Black, Paul E. (2005), Fisher-Yates Shuffle, “Dictionary of Algorithms and Data Structures,” National Institute of Standards and Technology, Retrieved 2007.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Vadlamudi, L.N., Vaddella, R.P.V., Devara, V. (2017). Robust Image Hashing Technique for Content Authentication based on DWT. In: Raman, B., Kumar, S., Roy, P., Sen, D. (eds) Proceedings of International Conference on Computer Vision and Image Processing. Advances in Intelligent Systems and Computing, vol 459. Springer, Singapore. https://doi.org/10.1007/978-981-10-2104-6_17
Download citation
DOI: https://doi.org/10.1007/978-981-10-2104-6_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2103-9
Online ISBN: 978-981-10-2104-6
eBook Packages: EngineeringEngineering (R0)