| Literature DB >> 27933251 |
Ram Kumar Karsh1, R H Laskar1, Bhanu Bhai Richhariya2.
Abstract
BACKGROUND: Image authentication is one of the challenging research areas in the multimedia technology due to the availability of image editing tools. Image hash may be used for image authentication which should be invariant to perceptually similar image and sensitive to content changes. The challenging issue in image hashing is to design a system which simultaneously provides rotation robustness, desirable discrimination, sensitivity and localization of forged area with minimum hash length.Entities:
Keywords: Image hashing; Multimedia security; PGNMF; Ring partition; Saliency detection
Year: 2016 PMID: 27933251 PMCID: PMC5118381 DOI: 10.1186/s40064-016-3639-6
Source DB: PubMed Journal: Springerplus ISSN: 2193-1801
Fig. 1Block diagram of the proposed image hashing
The PGNMF algorithm
Fig. 2Depicts the similar image information in rings of original image and its rotated version. a Original image. b 90° rotated image
Fig. 3Ring partition of a square image to construct secondary image. a Formation of annular rings (Red-Ring 1, Yellow-Ring 2, Green-Ring 3,...., Blue-Ring m). b Corresponding matrix representation
Fig. 4First Mask for
Fig. 5Second mask for
Proposed image hashing in details (From input image to generation of final hash)
|
| ||
| 1. | Pre-processing: The input image ( | |
| 2. | Global features extraction using ring partition-PGNMF | |
| a. | Let us consider the Y component of the pre-processedimage; | |
| b. | Divide Y into | |
| c. | Apply PGNMF to | |
| d. | Concatenate the matrix coefficients to give the hash of length | |
| e. | A secret key K1 randomly generates a row vector | |
| 3. | Extraction of local features | |
| a. | Detect | |
| b. | The | |
| c. | The texture features are computed for | |
| d. | The position vector | |
| e. | A secret key K2 randomly generates a row vector | |
| 4. | Finally, the two intermediate hash vectors are concatenated and pseudo-randomly scrambled on the basis of secret key K3 to obtain the final hash | |
|
| ||
Structure of image hash
| Global vector | Salient vector S | ||
|---|---|---|---|
| Ring partition-PGNMF |
|
| Final hash length |
| 64 integers | 4 × 6 = 24 integers | 3 × 6 = 18 integers | 106 integers |
Content-preserving operations with given parameter values
| Tool | Manipulation | Parameter | Parameter values |
|---|---|---|---|
| Stir Mark | JPEG compression | Quality factor | 30, 40, 50, 60, 70, 80, 90, 100 |
| Stir Mark | Watermark embedding | Strength | 10, 20, 30, 40, 50, 60, 70, 80, 90, 100 |
| Stir Mark | Scaling | Ratio | 0.5, 0.75, 0.9, 1.1, 1.5, 2.0 |
| Stir Mark | Rotation and Cropping | Rotation angle in degree | 1, 2, 5, 10, 15, 30, 45, 90, −1, −2, −5, −10, −15, −30, −45, −90 |
| Photoshop | Brightness adjustment | Photoshop Scale | 10, 20, −10, −20 |
| Photoshop | Contrast Adjustment | Photoshop Scale | 10, 20, −10, −20 |
| Matlab | Gamma Correction | Y | 0.5, 0.75, 0.9, 1.1, 1.5 |
| Matlab | 3 × 3 Gaussian low pass filter | Standard deviation | 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1 |
Fig. 7Robustness performance of the proposed algorithm for some content preserving operations
Fig. 9Discrimination test based on 300 different images
Fig. 8Different image samples used in discrimination test
Fig. 10Forged area localization. a, d, g Original images. b, e, h Forged images. c, f, i Green rectangle signifies the localized forged area
Image hashes for tampered image
| Image pairs | D |
|---|---|
| Figure | 31 |
| Figure | 29 |
| Figure | 34 |
Fig. 11ROC curve comparisons of the different algorithms
Comparison of proposed method with some of the state-of-the-art methods
| Comparison parameters | Ahmed et al. ( | Tang et al. ( | Monga and Mihcak ( | Khelifi and Jiang ( | Zhao et al. ( | Proposed method |
|---|---|---|---|---|---|---|
| Features used | Local | Global | Local | Local | Global and local features | Global and local features |
| Hash Length | 7168 bits | 320 bits | 64 floating point numbers | 250 bits | 560 bits | 848 bits |
| Robust against JPEG compression | Y | Y | Y | Y | Y | Y |
| Robust against rotation | NA | NA | NA | Y | Up to 5° only | All Arbitrary degree |
| Ability to detect small area forgery | Y | Y | Y | NA | Y | Y |
| Capability to find the counterfeit regions | Y | NA | NA | NA | Y | Y |
| Optimal TPR When FPR = 0 | 0.7843 | 0.8101 | 0.8213 | 0.8943 | 0.9157 | 0.9811 |
| Optimal FPR When TPR = 1 | 0.3265 | 0.4972 | 0.3545 | 0.6427 | 0.2187 | 0.0012 |
| Average time (s) | NA | 0.9321 | 2.98 | 2.6 | 2.4 | 2.1 |
NA not applicable, Y Yes