A Secure Perceptual Hash Algorithm for Image Content Authentication

被引:0
|
作者
Weng, Li [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC IBBT, Louvain, Belgium
来源
关键词
ROBUST; PHASE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perceptual hashing is a promising solution to image content authentication. However, conventional image hash algorithms only offer a limited authentication level for the protection of overall content. In this work, we propose an image hash algorithm with block level content protection. It extracts features from DFT coefficients of image blocks. Experiments show that the hash has strong robustness against JPEG compression, scaling, additive white Gaussian noise, and Gaussian smoothing. The hash value is compact, and highly dependent on a key. It has very efficient trade-offs between the false positive rate and the true positive rate.
引用
收藏
页码:108 / 121
页数:14
相关论文
共 50 条
  • [1] Image alignment based perceptual image hash for content authentication
    Wang, Xiaofeng
    Zhou, Xiaorui
    Zhang, Qian
    Xu, Bingchao
    Xue, Jianru
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 80
  • [2] A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
    Ding, Kaimeng
    Chen, Shiping
    Meng, Fan
    ALGORITHMS, 2018, 11 (01)
  • [3] Perceptual hash algorithm for integrity authentication of remote sensing image
    Ding, Kaimeng
    Zhu, Changqing
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2014, 44 (04): : 723 - 727
  • [4] A Visual Model-Based Perceptual Image Hash for Content Authentication
    Wang, Xiaofeng
    Pang, Kemu
    Zhou, Xiaorui
    Zhou, Yang
    Li, Lu
    Xue, Jianru
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1336 - 1349
  • [5] An Image Authentication Technique in Frequency Domain Using Secure Hash Algorithm (FDSHA)
    Nag, Amitava
    Biswas, Debasish
    Ghosh, Soumadip
    Biswas, Sushanta
    Sarkar, Debasree
    Sarkar, Partha Pratim
    ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL, 2011, 125 : 335 - +
  • [6] Novel perceptual image Hash algorithm
    Zhao, Yu-Xin
    Liu, Guang-Jie
    Dai, Yue-Wei
    Wang, Zhi-Quan
    Guangxue Jingmi Gongcheng/Optics and Precision Engineering, 2008, 16 (03): : 551 - 557
  • [7] Image authentication based on perceptual hash using Gabor filters
    Wang, Lina
    Jiang, Xiaqiu
    Lian, Shiguo
    Hu, Donghui
    Ye, Dengpan
    SOFT COMPUTING, 2011, 15 (03) : 493 - 504
  • [8] Image authentication based on perceptual hash using Gabor filters
    Lina Wang
    Xiaqiu Jiang
    Shiguo Lian
    Donghui Hu
    Dengpan Ye
    Soft Computing, 2011, 15 : 493 - 504
  • [9] A novel evaluation method for perceptual hash algorithm in authentication mode
    Liu, Zhaoqing
    Li, Qiong
    Liu, Jingrui
    Niu, Xiamu
    FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [10] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470