Skip to main content

Advertisement

Log in

Image authentication based on perceptual hash using Gabor filters

Soft Computing Aims and scope Submit manuscript

Abstract

Image authentication is an important topic in image forensics, which tells whether an image is tampered or not or even tells the tampered regions. To implement image authentication, image hash techniques have been reported recently. In this paper, we investigate existing image hash algorithms, and design an novel image hash based on human being's visual system. In this algorithm, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human’s primary visual cortex. For a given image, we compute the reference scale, direction and block to make sure the final hash can resist against rotation, scale, and translation attacks while maintain the sensitivity to local malicious manipulations. In addition, it has another promising ability to locate the tampered image blocks, and approximately determining the type of tampering methods (delete, add, modify) and the original direction of each block. This ability is very useful in forensics. The experimental results show that the strategy of the reference metrics works quite well and our method is much more effective than the other state of art image hash methods. Moreover, our method can still locate the content-altering changes even undergo some content-preserving manipulations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  • Bhattacharjee S, Vandergheynst P (1999) End-stopped wavelets for detection low-level features. In: Proceedings of SPIE, wavelet applications in signal and image processing, Denver, Colorado, vol 3813, pp 732–741. doi:10.1109/TIP.2006.881948

  • Cano P, Baltle E, Kalker T, Haitsma J (2002) A review of algorithms for audio fingerprinting. In: The IEEE workshop on multimedia signal processing (MSP’2002), St. Thomas, Virgin Islands, USA, pp 169–173

  • Daugman JG (1980) Two dimensional spectral analysis of cortical receptive field profile. Vis Res 20(10):847–856. doi:10.1016/0042-6989(80)90065-6

    Article  Google Scholar 

  • De Valois RL, Albrecht DG, Thorell LG (1982) Spatial frequency selectivity of cells in macaque visual cortex. Vis Res 20(10):545–559

    Article  Google Scholar 

  • Dittmann J, Steinmetz A, Steinmetz R (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceedings of the IEEE international conference on multimedia computing and systems (ICMCS’1999), Florence, Italy, vol 2, pp 209–213. doi:10.1109/MMCS.1999.778274

  • ECRYPT Network of Excellence Technical Report (2005) D.WVL.7: First summary report on forensic tracking. http://www.ecrypt.eu.org/ecrypt1/documents/D.WVL.7-1.1.pdf. Accessed 12 February 2009

  • ECRYPT Network of Excellence Technical Report (2006) D.WVL.11: Benchmarking metrics and concepts for perceptual hashing. http://www.ecrypt.eu.org/ecrypt1/documents/D.WVL.11-1.0.pdf. Accessed 12 February 2009

  • Fridrich J, Gojan M, Du R (2000) Robust hash function for digital watermarking. In: Proceeding of the IEEE international conference on information technology: coding and computing (ITCC’2000), Las Vegas, Nevada, pp 178–183. doi:10.1109/ITCC.2000.844203

  • Han SH, Chu CH, Yang SY (2007) Content-based image authentication: current status, issues, and challenges. In: Proceedings of the IEEE international conference on semantic computing (ICSC’2007), Irvine, California, pp 630–636. doi:10.1109/ICSC.2007.100

  • Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39(1):1–46. doi:10.1007/s11042-007-0154-3

    Article  Google Scholar 

  • Jones JP, Palmer L (1987) An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex. J Neurophysiol 58(6):1233–1258

    Google Scholar 

  • Kim C (2003) Content-based image copy detection. Signal Process Image Commun 18(3):169–184. doi:0.1016/S0923-5965(02)00130-3

    Article  Google Scholar 

  • Kozat SS, Mihcak K, Venkatesan R (2004) Robust perceptual image hashing via matrix invariances. In: Proceeding of the IEEE international conference on image processing (ICIP’2004), vol 5, pp 3443–3446. doi:10.1109/TIFS.2007.902670

  • Lian SG (2008) Multimedia content authentication based on neural networks. In: Columbus F (ed) Neurocomputing research trends. Nova Science Publishers, Inc., pp 223–238

  • Lian SG (2008) Image authentication based on fractal features. Fractals 16(4):287–297. doi:10.1142/S0218348X08004034

    Article  MATH  MathSciNet  Google Scholar 

  • Lian SG, Sun JS, Wang ZQ (2006) Secure hash function based on neural network. Int J Neurocomput 69(16–18):2346–2350. doi:10.1016/j.neucom.2006.04.00

    Article  Google Scholar 

  • Lian SG, Kanellopoulos D, Ruffo G (2009) Recent advances in multimedia information system security. Inform 33(1):3–24

    MathSciNet  Google Scholar 

  • Lin CY, Chang SF (1998) Robust image authentication method surviving JPEG lossy compression. In: Proceedings of SPIE, storage and retrieval of image/video database, San Jose, CA, USA, vol 3312, pp 296–307. doi:10.1117/12.298462

  • Lu CS, Liao HYM (2003) Structural digital signature for image authentication. IEEE Trans Multimedia 5(2):161–173. doi:10.1145/357744.357893

    Article  MathSciNet  Google Scholar 

  • Monga V, Evans RL (2004) Robust perceptual image hashing using feature points. In: In: Proceedings of the IEEE international conference on image processing (ICIP’2004), Singapore, vol 1, pp 677–680. doi:10.1109/ICIP.2004.1418845

  • Monga V, Evans RL (2006) Perceptual image hashing via feature points: performance evaluation and trade-offs. IEEE Trans Image Process 15(11):3453–3466. doi:10.1109/TIP.2006.881948

    Google Scholar 

  • Queluz MP (1998) Towards robust content based techniques for image authentication. In: the second IEEE workshop on multimedia signal processing (MSP’1998), Redondo Beach, CA, USA, pp 297–302. doi:10.1109/MMSP.1998.738950

  • Scheneider M, Chang SF (1996) A robust content based digital signature for image authentication. In: Proceeding of the IEEE international conference on image processing, Laussane, Switzerland, vol 3, pp 227–230. doi:10.1109/ICIP.1996.560425

  • Swaminathan A, Mao YN, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 1(2):215–230. doi:10.1109/TIFS.2006.873601

    Article  Google Scholar 

  • Venkatesan R, Koon SM, Jakubowski MH, Moulin P (2000) Robust image hashing. In: Processing of the IEEE international conference on image processing (ICIP’2000), Vancouver, BC, Canada, vol 3, pp 664–666. doi:10.1109/ICIP.2000.899541

  • Wang SZ, Zhang XP (2007) Recent development of perceptual image hashing. J Shanghai University 11(4):323–331. doi:10.1007/s11741-007-0401-2

    Article  MATH  Google Scholar 

  • Wang JW, Lian SG, Liu GJ, Dai YW (2008) Secure multimedia watermarking authentication in wavelet domain. SPIE J Electron Imaging 17(03):033010. doi:10.1117/1.2954129

    Google Scholar 

  • Wang JW, Lian SG, Liu GJ (2009) On the design of secure multimedia authentication. J Univers Comput Sci 15(2):426–443

    Google Scholar 

  • Wu MN, Lin CC, Chang CC (2007) Novel image copy detection with rotating tolerance. J Syst Softw 80(7):1057–1069. doi:10.1016/j.jss.2006.12.001

    Article  Google Scholar 

  • Yang B, Gu F, Niu XM (2006) Block mean value based image perceptual hashing. In: Proceeding of the IEEE international conference on intelligent information hiding and multimedia signal processing (IIH-MSP’2006), Pasadena, California, pp 167–170. doi:10.1109/IIH-MSP.2006.265125

Download references

Acknowledgments

This work was funded by the major project of Chinese National Natural Science Foundation under the grant code of 90718006, the Chinese National Natural Science Foundation of China under the grant code of 60743003, and the Ph.D. Programs Foundation of Ministry of Education of China under the grant code of 20070486107.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaqiu Jiang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, L., Jiang, X., Lian, S. et al. Image authentication based on perceptual hash using Gabor filters. Soft Comput 15, 493–504 (2011). https://doi.org/10.1007/s00500-009-0529-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-009-0529-7

Keywords

Navigation