Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Robust image hashing using exact Gaussian–Hermite moments

In this work, a new method for robust image hashing is presented. The objectives of image hash are robustness and uniqueness. Exact Gaussian–Hermite moments and their invariants are used to extract highly accurate features for grey-scale images. The hash value is estimated by the sender from the features of the given image and then appended to the image to be sent. On the other hand, the authenticity of the received image has been checked by decrypting the hash value at the receiver side. To increase the level of security, a pre-shared key is used between the sender and the receiver. This process is to encrypt the hash value using a secret key before attaching with the image and then transmitting it. The similarity between different hashes is calculated by using Euclidean distance. Numerical simulation ensures the robustness of the proposed method against different kinds of attacks and preserves the image content. Hash different images exhibit very low collision probability which proves the suitability of the proposed method for robust image hash. The proposed method is compared with the existing hash methods where the obtained results clearly show the superiority of the proposed method.

References

    1. 1)
      • 22. Yang, B., Flusser, J., Suk, T.: ‘Design of high-order rotation invariants from Gaussian–Hermite moments’, Signal Process., 2015, 113, pp. 6167.
    2. 2)
      • 29. http://www.imageprocessingplace.com/root_files_V3/image_databases.html.
    3. 3)
      • 15. Zhao, Y., Wang, S., Zhang, X., et al: ‘Robust hashing for image authentication using Zernike moments and local features’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (1), pp. 5563.
    4. 4)
      • 8. Zhao, Y., Wang, S., Feng, G., et al: ‘A robust image hashing method based on Zernike moments’, J. Comput. Inf., 2010, 6, (3), pp. 717725.
    5. 5)
      • 9. Weng, L., Preneel, B.: ‘A secure perceptual hash algorithm for image content authentication’, IFIP Int. Fed. Inf. Process., 2011, 7025, pp. 108121.
    6. 6)
      • 21. Papakostas, G.A.: ‘Moments and moment invariants – theory and applications’ (Science Gate Publishing P.C., Thrace, Greece, 2014).
    7. 7)
      • 25. Ouyang, J., Wen, X., Liu, J., et al: ‘Robust hashing based on quaternion Zernike moments for image authentication’, ACM Trans. Multimedia Comput. Commun. Appl., 2016, 12, pp. 113.
    8. 8)
      • 1. Haouzia, A., Noumeir, R.: ‘Methods for image authentication: a survey’, Multimed. Tools Appl., 2008, 39, (1), pp. 146.
    9. 9)
      • 28. Hosny, K.M.: ‘New set of Gegenbauer moment invariants for pattern recognition applications’, Arab. J. Sci. Eng., 2014, 39, (10), pp. 70977107.
    10. 10)
      • 2. Sebastian, L.S., Varghese, A., Manesh, T.: ‘Image authentication by content preserving robust image hashing using local and global features’, Proc. Comput. Sci., 2015, 46, pp. 15541560.
    11. 11)
      • 7. Ahmed, F., Siyal, M.Y., Uddin, V.: ‘A secure and robust hash-based scheme for image authentication’, Signal Process., 2010, 90, (5), pp. 14561470.
    12. 12)
      • 17. Tang, Z., Zhang, X., Zhang, S., et al: ‘Robust perceptual image hashing based on ring partition and NMF’, IEEE Trans. Knowl. Data Eng., 2014, 26, (3), pp. 711724.
    13. 13)
      • 3. Monga, V., Banerjee, A., Evans, B.L.: ‘A clustering based approach to perceptual image hashing’, IEEE Trans. Inf. Forensics Sec., 2006, 1, (1), pp. 6879.
    14. 14)
      • 13. Lv, X., Wang, Z.J.: ‘Perceptual image hashing based on shape contexts and local feature points’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (3), pp. 10811093.
    15. 15)
      • 16. Jothimani, S., Betty, P.: ‘A survey on image authentication techniques’, Int. J. Eng. Trends Technol., 2014, 7, (4), pp. 184186.
    16. 16)
      • 12. Tang, Z., Wang, S., Zhang, X., et al: ‘Lexicographical framework for image hashing with implementation based on DCT and NMF’, Multimedia Tools Appl., 2011, 52, (2–3), pp. 325345.
    17. 17)
      • 6. Tang, Z., Wang, S., Zhang, X., et al: ‘Robust image hashing for tamper detection using non-negative matrix factorization’, J. Ubiquit. Converg. Technol., 2008, 2, (1), pp. 1826.
    18. 18)
      • 26. Tang, Z., Dai, Y., Zhang, X.: ‘Perceptual hashing for color images using invariant moments’, Appl. Math. Inf. Sci, 2012, 6, pp. 643650.
    19. 19)
      • 23. Hosny, K.M., Papakostas, G.A., Koulouriotis, D.E.: ‘Accurate reconstruction of noisy medical images using orthogonal moments’. 2013 18th Int. Conf. on Digital Signal Processing (DSP), 2013, pp. 16.
    20. 20)
      • 18. Tang, Z., Yang, F., Huang, L., et al: ‘Robust image hashing with dominant DCT coefficients’, Opt. – Int. J. Light Electron Opt., 2014, 125, (18), pp. 51025107.
    21. 21)
      • 31. Fawcett, T.: ‘An introduction to ROC analysis’, Pattern Recognit. Lett., 2006, 27, (8), pp. 861874.
    22. 22)
      • 4. Swaminathan, A., Mao, Y., Wu, M.: ‘Robust and secure image hashing’, IEEE Trans. Inf. Forensics Sec., 2006, 1, (2), pp. 215230.
    23. 23)
      • 5. Monga, V., Mıhçak, M.K.: ‘Robust and secure image hashing via non-negative matrix factorizations’, IEEE Trans. Inf. Forensics Sec., 2007, 2, (3), pp. 376390.
    24. 24)
      • 20. Tang, Z., Zhang, X., Li, X., et al: ‘Robust image hashing with ring partition and invariant vector distance’, IEEE Trans. Inf. Forensics Sec., 2016, 11, (1), pp. 200214.
    25. 25)
      • 27. Flusser, J., Zitova, B., Suk, T.: ‘Moments and moment invariants in pattern recognition’, 2010.
    26. 26)
      • 14. Zhao, Y.: ‘Perceptual image hash using texture and shape feature’, J. Comput. Inf. Syst., 2012, 8, (8), pp. 35193526.
    27. 27)
      • 24. Hosny, K.M.: ‘Fast computation of accurate Gaussian–Hermite moments for image processing applications’, Digit. Signal Process., 2012, 22, (3), pp. 476485.
    28. 28)
      • 11. Lei, Y., Wang, Y.-G., Huang, J.: ‘Robust image hash in radon transform domain for authentication’, Signal Process. Image Commun., 2011, 6, (26), pp. 280288.
    29. 29)
      • 10. Zhao, Y., Yuan, Y., Wei, W.: ‘Extraction of shape feature for image hash’, J. Comput. Inf. Syst., 2011, 7, (16), pp. 56605667.
    30. 30)
      • 19. Chen, Y., Yu, W., Feng, J.: ‘Robust image hashing using invariants of Tchebichef moments’, Optik, 2014, 125, (19), pp. 55825587.
    31. 31)
      • 30. http://decsai.ugr.es/cvg/dbimagenes/g512.php.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2018.5661
Loading

Related content

content/journals/10.1049/iet-ipr.2018.5661
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address