A Short Survey on Perceptual Hash Function

Arambam Neelima, Kh Manglem Singh

Abstract


The authentication of digital image has become more important as these images can be easily manipulated by using image processing tools leading to various problems such as copyright infringement and hostile tampering to the image contents. It is almost impossible to distinguish subjectively which images are original and which have been manipulated. There are several cryptographic hash functions that map the input data to short binary strings but these traditional cryptographic hash functions is not suitable for image authentication as they are very sensitive to every single bit of input data. When using a cryptographic hash function, the change of even one bit of the original data results in a radically different value. A modified image should be detected as authentic by the hash function and at the same time must be robust against incidental and legitimate modifications on multimedia data. The main aim of this paper is to present a survey of perceptual hash functions for image authentication.

Keywords: Hash function, image authentication

*Cite as: Arambam Neelima, Kh. Manglem Singh, “A Short Survey on Perceptual Hash Function†ADBU-J.Engg Tech, 1(2014) 0011405(8pp)


Full Text:

PDF

References


W. Stalling, Cryptography and Network Security, 4 Edition. vol. 3, Ed. Pearson Education India, 2006.

B. Canova , A Survey of Security Mechanisms to Verify the Integrity and Authenticity of Multimedia-based Data,2011

A Swaminathan, Y.N. Mao, M. Wu, “Robust and secure image hashing,†IEEE Trans. Inf. Forensics Security. 1 (2) pp 215–230, 2006

S Xiang, HJ Kim, J Huang, “Histogram-based image hashing scheme robust against geometric deformationsâ€. In proceeding of the 9th ACM Multimedia and Security Workshop (Dallas, Texas, USA), pp. 121–128, 2007.

Y S Choi and J H park, “Image hash generation method using hierarchical histogram†Multimedia Tools and Applications, Multimedia Tools and Applications , Springer, Vol.61, Iss.1, pp.181-194, 2012.

J Fridrich, M Goljan, Robust hash functions for digital watermarking. In the proceeding ofIEEE International Conference on Information Technology: Coding Computing (Las Vegas, NV , USA), pp. 178–183,2000.

C.Y.Lin,S.-F.Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,†IEEE Transactions on Circuits and Systems for Video Technology 11(2) ,pp. 53–168, 2001.

Q. Sun, S. F Chang “A Robust and Secure media signature scheme for JPEG images,†Journal of VLSI Signal Processing , Vol. 41, Issue 3 pp. 305-317,2005.

M.K. Mihcak and R. Venkatesan.“New iterative geometric methods for robust perceptual image hashingâ€. In ACM Workshop Security and Privacy in Digital Rights Management, Philadelphia, PA, Nov. 2001.

V. Monga, M.K. Mihcak, “Robust and secure image hashing via non-negative matrix factorizations,†IEEE Trans. Inf. Forensics.2(3) pp. 376–390, 2007.

R.A. Parrao-Hernandez, M.N. Miyatake and B. M.Kurkoski, “Robust Image Hashing Using Image Normalization and SVD Decomposition,†54rd IEEE International Midwest Symposium on Circuits and Systems (MWSCAS) ,2011.

A Swaminathan, Y Mao, M Wu, “Image hashing resilient to geometric and filtering operations.†In the proceeding of IEEE Workshop on Multimedia Signal Processing(Siena, Italy), pp. 355–358,2004

C.Y.Lin,S.-F.Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,†IEEE Transactions on Circuits and Systems for Video Technology 11(2), pp.53–168,2001

R. Venkatesan, S.M. Koon, M.H. Jakubowski, and P Moulin.“Robust image hashing,†In IEEE International Conference Image Processing, Vancouver, BC, Canada, Sep. 2000, pp 664-666, 2000.

V.Monga, M.K.Mihcak, “Robust and secure Image hashing via non-negative matrix factorizations,†IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp.376– 390, Sep 2007.

Z.Tang, Y.Dai ,X.Zhang, “Perceptual hashing for color images using invariant moments,†Applied Mathematics & Information Sciences (2012)643S 650S.

Y. Lei, Y. Wang, J. Huang, “Robust image hash in Radon transform domain for authentication,†Signal Processing: Image Communication Vol. 26, pp.280–288,2011

F. Lefebvre, B. Macq, J.D. Legat, “Rash: Radon Soft Hash Algorithm,†In Proceedings of the European Signal Processing Conference (EUSIPCO’02), Toulouse, France, September 2002.

Lefebvre, F., Czyz, J., Macq, B, “A robust soft hash algorithm for digital image signature.†In Proceedings of the IEEE International Conference on Image Processing. Vol. II, Barcelona,Spain, pp. 495–498,2003

F. Ahmed, M.Y. Siyal, V.U. Abbas, “A secure and robust hash-based scheme for image authentication,†Signal Processing Vol. 90 pp. 1456–1470, 2010.

Tang, S. Wang, X. Zhang, W. Wei, S. Su, Robust image hashing for tamper detection using non-negative matrix factorization, Journal of Ubiquitous Convergence and Technology Vol. 2 , pp.18–26, 2008.

S. S. Kozat, M. K. Mihcak and R. Venkatesan, “Robust Hashing via Matrix Invariances,†IEEE Transactions on Image Processing.Kozat S.S, Venkatesan R, Mihcak M.K., "Robust perceptual image hashing via matrix invariants," International Conference on Image Processing, ICIP '04, vol.5, pp.3443-3446 Vol. 5, 24-27 Oct. 2004

Lin Y, Chang SF “ A robust image authentication system distinguishing JPEG compression from malicious manipulation.†IEEE Transactions on Circuits System Video Technology, Vol 11(2), pp.153–168, 2001.

Monga V, Evans BL “Perceptual image hashing via feature points: performance evaluation and trade-offs.†IEEE Transaction on Image Process Vol. 15(11), pp. 3453–3466.

Zhenjun Tang, Xianquan Zhang, Xuan Dai,Jianzhong Yang, Tianxiu Wu, “Robust Image Hash Function using local color features,†Int. J. Electron. Comm.(AEU)67, pp.717-722,2013

Di Wu, Xuebing, XiamuNiu, “A novel mage hash algorithm resistant to print scan†Signal Processing Vol. 89, pp. 2415-2424,2009.

VC Guo and D Hatzinakos, “Content based image hashing via wavelet and Radon transform,†Advances in Multimedia Information Processing PCM. Vol 4810, pp.755-764, 2007

F Ahmed,M Y Siyal and Vali Uddin Abbas, “A Secure and Robust hash-based scheme for image authentication†Signal Processing Vol. 90, pp. 1456-1470,2010

Azharet. Al “A Robust and secure perceptual hashing system based on a quantization step analysis†Signal processing Volume 28, Issue 8, , pp. 929–948, September 2013.

F.Liu and L.M Chang, “Perceptual image hashing via wave atom transform,†Digital Forensic and Watermarking pp. 468-478. 2011

Zhenjun Tang , Xianquan Zhang, Liyan Huang, Yumin Dai, “Robust Image hashing using Ring based Entropies,†Signal Processing ,Vol. 93, Issue 7, pp. 2061–2069, July 2013

Chun-ShienLu and Chao-Yong Hsu, “Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication,†Multimedia SystemsVol.11, Issue 2 , pp.159-173.


Refbacks

  • There are currently no refbacks.


------------------------------------------------------------------------------------------------------------------------

The ADBU Journal of Engineering Technology (AJET)" ISSN:2348-7305

This journal is published under the terms of the Creative Commons Attribution (CC-BY) (http://creativecommons.org/licenses/)

Number of Visitors to this Journal: