Image authentication using perceptual hashing

@article{RamrezGutirrez2013ImageAU,
  title={Image authentication using perceptual hashing},
  author={Kelsey A. Ram{\'i}rez-Guti{\'e}rrez and Mariko Nakano-Miyatake and Hector Perez-Meana},
  journal={Scientific Research and Essays},
  year={2013},
  volume={8},
  pages={454-462}
}
This paper presents a review of image authentication methods, based on the perceptual image hashing approach. Firstly we analyze two algorithms, which have the capability of determining if an image is authentic or not, even if it has suffered content preserving distortions such as compression, filtering and other signal processing operations; as well as some malicious modification such as geometric distortions. Next two modifications of these algorithms are analyzed which improve their… 

Figures and Tables from this paper

Secure Perceptual Hashing Scheme for Image using Encryption

  • M. SahanaM. N. Geetha
  • Computer Science, Mathematics
    2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC)
  • 2017
TLDR
A theoretical analysis of full perceptual hashing systems that use a quantization module followed by a crypto-compression module is proposed and several experiments are conducted to validate the approach, by Gaussian noise and JPEG compression.

Secure Perceptual Hashing of Data using Encryption

  • M. Sahana
  • Computer Science, Mathematics
    2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC)
  • 2017
TLDR
This paper proposes a theoretical analysis of full perceptual hashing systems that use a quantization module followed by a crypto-compression module and several experiments are conducted to validate the approach, by Gaussian noise and JPEG compression.

OPTIMIZED H YBRID SECURITY M ECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USING PSO

TLDR
An optimized hybrid image security mechanism for authentication and secrecy of images by means of Particle Swarm Optimization (PSO) in daubechies4 transform is illustrated in this paper.

A Study to Ascertain and Differentiate between Genuine and Transplanted Documents/Signatures

TLDR
This paper deals with examining simple features present in image/ document which can be used to check the authenticity of an electronic document, whether they are genuine or forged.

Novi algoritam za izradu percepcijskih sažetaka temeljen na izdvajanju atributa biometrijskih karakteristika

S napretkom racunalnih i mrežnih tehnologija, kolicina digitalnih slika koje se prenose ili pregledavaju putem digitalnih uređaja eksponencijalno

References

SHOWING 1-10 OF 16 REFERENCES

A Novel Hashing Scheme for Image Authentication

  • F. AhmedM. Y. Siyal
  • Computer Science, Mathematics
    2006 Innovations in Information Technology
  • 2006
TLDR
A novel image hashing scheme is proposed that directly modulates pixels in the spatial domain based on a secret key and is moderately robust against JPEG compression and fragile to detect and localize tampered areas in an image.

Robust and secure image hashing

TLDR
A novel algorithm for generating an image hash based on Fourier transform features and controlled randomization is developed and it is shown that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions.

A secure and robust hash-based scheme for image authentication

An Image Structure Information Based Robust Hash for Tamper Detection and Localization

TLDR
A general robust hash based image tamper detection and localization scheme using existed robust hash algorithms is presented, considering the different features of common CPM and malicious tamper.

Perceptual Image Hashing Based on Virtual Watermark Detection

TLDR
A new robust and secure perceptual image hashing technique based on virtual watermark detection that has been shown to outperform related state-of-the art techniques recently proposed in the literature in terms of robustness with respect to image processing manipulations and geometric attacks.

A Robust and Discriminative Image Perceptual Hash Algorithm

TLDR
Experimental results show that the proposed image perceptual hash algorithm can effectively address the tamper detection problem with advantageous robustness and discrimination.

Improvement of Radon Transform-Based Perceptual Hashing using Image Normalization

TLDR
An improvement method using image normalization for Radon transform (RT)-based perceptual image hashing in which a normalized image is generated before the image hashing estimation doing it invariant to a wide range of geometric distortions is proposed.

A novel image hash algorithm resistant to print-scan

A robust image fingerprinting system using the Radon transform

Adaptive Digital Watermark System Using Soft Computation

TLDR
The experimental results show that the proposed adaptive watermark system of still image in discrete cosine transform (DCT) domain are robust against attacks most commonly used image processing algorithms and provides very good results in term of image imperceptibility.