Abstract
Image authentication is an important topic in image forensics, which tells whether an image is tampered or not or even tells the tampered regions. To implement image authentication, image hash techniques have been reported recently. In this paper, we investigate existing image hash algorithms, and design an novel image hash based on human being's visual system. In this algorithm, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human’s primary visual cortex. For a given image, we compute the reference scale, direction and block to make sure the final hash can resist against rotation, scale, and translation attacks while maintain the sensitivity to local malicious manipulations. In addition, it has another promising ability to locate the tampered image blocks, and approximately determining the type of tampering methods (delete, add, modify) and the original direction of each block. This ability is very useful in forensics. The experimental results show that the strategy of the reference metrics works quite well and our method is much more effective than the other state of art image hash methods. Moreover, our method can still locate the content-altering changes even undergo some content-preserving manipulations.
Similar content being viewed by others
References
Bhattacharjee S, Vandergheynst P (1999) End-stopped wavelets for detection low-level features. In: Proceedings of SPIE, wavelet applications in signal and image processing, Denver, Colorado, vol 3813, pp 732–741. doi:10.1109/TIP.2006.881948
Cano P, Baltle E, Kalker T, Haitsma J (2002) A review of algorithms for audio fingerprinting. In: The IEEE workshop on multimedia signal processing (MSP’2002), St. Thomas, Virgin Islands, USA, pp 169–173
Daugman JG (1980) Two dimensional spectral analysis of cortical receptive field profile. Vis Res 20(10):847–856. doi:10.1016/0042-6989(80)90065-6
De Valois RL, Albrecht DG, Thorell LG (1982) Spatial frequency selectivity of cells in macaque visual cortex. Vis Res 20(10):545–559
Dittmann J, Steinmetz A, Steinmetz R (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceedings of the IEEE international conference on multimedia computing and systems (ICMCS’1999), Florence, Italy, vol 2, pp 209–213. doi:10.1109/MMCS.1999.778274
ECRYPT Network of Excellence Technical Report (2005) D.WVL.7: First summary report on forensic tracking. http://www.ecrypt.eu.org/ecrypt1/documents/D.WVL.7-1.1.pdf. Accessed 12 February 2009
ECRYPT Network of Excellence Technical Report (2006) D.WVL.11: Benchmarking metrics and concepts for perceptual hashing. http://www.ecrypt.eu.org/ecrypt1/documents/D.WVL.11-1.0.pdf. Accessed 12 February 2009
Fridrich J, Gojan M, Du R (2000) Robust hash function for digital watermarking. In: Proceeding of the IEEE international conference on information technology: coding and computing (ITCC’2000), Las Vegas, Nevada, pp 178–183. doi:10.1109/ITCC.2000.844203
Han SH, Chu CH, Yang SY (2007) Content-based image authentication: current status, issues, and challenges. In: Proceedings of the IEEE international conference on semantic computing (ICSC’2007), Irvine, California, pp 630–636. doi:10.1109/ICSC.2007.100
Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39(1):1–46. doi:10.1007/s11042-007-0154-3
Jones JP, Palmer L (1987) An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex. J Neurophysiol 58(6):1233–1258
Kim C (2003) Content-based image copy detection. Signal Process Image Commun 18(3):169–184. doi:0.1016/S0923-5965(02)00130-3
Kozat SS, Mihcak K, Venkatesan R (2004) Robust perceptual image hashing via matrix invariances. In: Proceeding of the IEEE international conference on image processing (ICIP’2004), vol 5, pp 3443–3446. doi:10.1109/TIFS.2007.902670
Lian SG (2008) Multimedia content authentication based on neural networks. In: Columbus F (ed) Neurocomputing research trends. Nova Science Publishers, Inc., pp 223–238
Lian SG (2008) Image authentication based on fractal features. Fractals 16(4):287–297. doi:10.1142/S0218348X08004034
Lian SG, Sun JS, Wang ZQ (2006) Secure hash function based on neural network. Int J Neurocomput 69(16–18):2346–2350. doi:10.1016/j.neucom.2006.04.00
Lian SG, Kanellopoulos D, Ruffo G (2009) Recent advances in multimedia information system security. Inform 33(1):3–24
Lin CY, Chang SF (1998) Robust image authentication method surviving JPEG lossy compression. In: Proceedings of SPIE, storage and retrieval of image/video database, San Jose, CA, USA, vol 3312, pp 296–307. doi:10.1117/12.298462
Lu CS, Liao HYM (2003) Structural digital signature for image authentication. IEEE Trans Multimedia 5(2):161–173. doi:10.1145/357744.357893
Monga V, Evans RL (2004) Robust perceptual image hashing using feature points. In: In: Proceedings of the IEEE international conference on image processing (ICIP’2004), Singapore, vol 1, pp 677–680. doi:10.1109/ICIP.2004.1418845
Monga V, Evans RL (2006) Perceptual image hashing via feature points: performance evaluation and trade-offs. IEEE Trans Image Process 15(11):3453–3466. doi:10.1109/TIP.2006.881948
Queluz MP (1998) Towards robust content based techniques for image authentication. In: the second IEEE workshop on multimedia signal processing (MSP’1998), Redondo Beach, CA, USA, pp 297–302. doi:10.1109/MMSP.1998.738950
Scheneider M, Chang SF (1996) A robust content based digital signature for image authentication. In: Proceeding of the IEEE international conference on image processing, Laussane, Switzerland, vol 3, pp 227–230. doi:10.1109/ICIP.1996.560425
Swaminathan A, Mao YN, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 1(2):215–230. doi:10.1109/TIFS.2006.873601
Venkatesan R, Koon SM, Jakubowski MH, Moulin P (2000) Robust image hashing. In: Processing of the IEEE international conference on image processing (ICIP’2000), Vancouver, BC, Canada, vol 3, pp 664–666. doi:10.1109/ICIP.2000.899541
Wang SZ, Zhang XP (2007) Recent development of perceptual image hashing. J Shanghai University 11(4):323–331. doi:10.1007/s11741-007-0401-2
Wang JW, Lian SG, Liu GJ, Dai YW (2008) Secure multimedia watermarking authentication in wavelet domain. SPIE J Electron Imaging 17(03):033010. doi:10.1117/1.2954129
Wang JW, Lian SG, Liu GJ (2009) On the design of secure multimedia authentication. J Univers Comput Sci 15(2):426–443
Wu MN, Lin CC, Chang CC (2007) Novel image copy detection with rotating tolerance. J Syst Softw 80(7):1057–1069. doi:10.1016/j.jss.2006.12.001
Yang B, Gu F, Niu XM (2006) Block mean value based image perceptual hashing. In: Proceeding of the IEEE international conference on intelligent information hiding and multimedia signal processing (IIH-MSP’2006), Pasadena, California, pp 167–170. doi:10.1109/IIH-MSP.2006.265125
Acknowledgments
This work was funded by the major project of Chinese National Natural Science Foundation under the grant code of 90718006, the Chinese National Natural Science Foundation of China under the grant code of 60743003, and the Ph.D. Programs Foundation of Ministry of Education of China under the grant code of 20070486107.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, L., Jiang, X., Lian, S. et al. Image authentication based on perceptual hash using Gabor filters. Soft Comput 15, 493–504 (2011). https://doi.org/10.1007/s00500-009-0529-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-009-0529-7