Abstract

Perceptual image hashing system generates a short signature called perceptual hash attached to an image before transmission and acts as side information for analyzing the trustworthiness of the received image. In this paper, we propose a novel approach to improve robustness for perceptual image hashing scheme for generating a perceptual hash that should be resistant to content-preserving manipulations, such as JPEG compression and Additive white Gaussian noise (AWGN) also should differentiate the maliciously tampered image and its original version. Our algorithm first constructs a robust image, derived from the original input by analyzing the stability of the extracted features and improving their robustness. From the robust image, which does perceptually resemble the original input, we further extract the final robust features. Next, robust features are suitably quantized allowing the generation of the final perceptual hash using the cryptographic hash function SHA1. The main idea of this paper is to transform the original image into a more robust one that allows the extraction of robust features. Generation of the robust image turns out be quite important since it introduces further robustness to the perceptual image hashing system. The paper can be seen as an attempt to propose a general methodology for more robust perceptual image hashing. The experimental results presented in this paper reveal that the proposed scheme offers good robustness against JPEG compression and Additive white Gaussian noise.

Highlights

  • The widespread use of multimedia technology has made it relatively easy to manipulate and tamper visual data

  • Based on the statistical analysis of the extracted features behavior (Hadmi, Puech, Ait Essaid, & Ait ouahman, 2011), we propose in this paper a novel approach for perceptual image hashing system for image authentication that simultaneously attempts to address these core issues

  • Unlike most existing schemes that only focus on extracting robust visual features to generate the final perceptual hash, we propose a new approach by enhancing the robustness of the extracted features

Read more

Summary

Introduction

The widespread use of multimedia technology has made it relatively easy to manipulate and tamper visual data. The direct use of cryptographic hash functions is designed to be strongly dependent on every single bit of the input data (Menezes, Oorschot, Vanstone & Rivest, 1997). This property of cryptographic hash functions is not suitable for multimedia data, since the carried information is mostly retained even when the multimedia data have undergone various content-preserving operations like for example compression or filtering. All the content-preserving manipulations change the bits of the multimedia data while leaving the image perception unaltered. Perceptual image hashing schemes have been proposed as solutions to get over the above problems by establishing the “perceptual equality” of image content. A perceptual image hashing system is expected to be http://cis.ccsenet.org

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call