Abstract
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet the requirements. In this paper, a perceptual hashing based forensics scheme is proposed for the integrity authentication of a HRRS image. The proposed scheme firstly partitions the HRRS image into grids and adaptively pretreats the grid cells according to the entropy. Secondly, the multi-scale edge features of the grid cells are extracted by the edge chains based on the adaptive strategy. Thirdly, principal component analysis (PCA) is applied on the extracted edge feature to get robust feature, which is then normalized and encrypted with secret key set by the user to receive the perceptual hash sequence. The integrity authentication procedure is achieved via the comparison between the recomputed perceptual hash sequence and the original one. Experimental results have shown that the proposed scheme has good robustness to normal content-preserving manipulations, has good sensitivity to detect local subtle and illegal tampering of the HRRS image, and has the ability to locate the tampering area.
Highlights
With the development of remote sensing technology, high resolution remote sensing (HRRS)image is of great help for various fields
Aiming at high requirements of measuring accuracy and the scale characteristics of the HRRS image, this paper proposes a perceptual hash algorithm based on multiscale robust edge feature for the forensics of integrity authentication for the HRRS image
We have proposed a perceptual hashing based forensics scheme for the integrity authentication of a high resolution remote sensing image
Summary
With the development of remote sensing technology, high resolution remote sensing (HRRS). The increasing spatial resolution provides new opportunities for advancing remote sensing image analysis and understanding, making it possible to develop novel approaches that were not possible before, especially for defense and military applications It has resulted in a significant challenge: how to ensure the security of HRRS image, the data integrity authentication. Traditional forensics techniques for data authentication mainly include cryptographic hash functions, digital signatures, and fragile watermarks. Traditional forensics techniques such as cryptographic Hash functions, digital signatures, and fragile watermarks cannot fully solve the problem of integrity authentication for a HRRS image. Aiming at high requirements of measuring accuracy and the scale characteristics of the HRRS image, this paper proposes a perceptual hash algorithm based on multiscale robust edge feature for the forensics of integrity authentication for the HRRS image.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.