Robust Hash for Detecting and Localizing Image Tampering

Article Preview

Abstract:

In order to improve the sensitive to illegal manipulations of image hashing, a novel robust image hashing algorithm based on fractional Fourier transform (FRFT) for detecting and localizing image tampering is proposed in this paper. The framework of generating an image hashing includes three steps: preprocessing, feature extracting and post processing. The robust hashing sequence is obtained by FRFT coefficients of image blocks. The security of proposed algorithm is totally depended on the orders of FRFT which are saved as secret keys. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as JPEG compression, mid-filtering, and rotation, more importantly the tampered place can be identified accurately.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 439-440)

Pages:

1018-1023

Citation:

Online since:

June 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sujoy Roy, Qibin Sun, in: IEEE International Conference On Image Processing, edtied by IEEE Int, (2007) in press.

Google Scholar

[2] Soo-Chang Pei, Jian-Jiun Ding: IEEE Trans on Signal Processing Vol. 48 (2000), p.1338.

DOI: 10.1109/78.839981

Google Scholar

[3] Hadun M. Ozaktas, Orhan Arikan: IEEE Trans on Signal Processing Vol. 9 (1996), p.2141.

Google Scholar

[4] S.C. Pei, M.H. Yeh: Signal Processing Vol. 67 (1998), p.99.

Google Scholar

[5] R. Venkatesan, S.M. Koon,M. H. Jakubowski, and P. Moulin, in: Proc. IEEE Conf. on Image Processing, edtied by IEEE Int, Vancourver (2000) in press.

Google Scholar

[6] J. Fridrich and M. Goljan, in: Proc. Information Technology: Coding and Computing, edited by IEEE Int, Las Vegas (2000) in press.

Google Scholar

[7] K. Mihcak and R. Venkatesan, in: Proc. Security and Privacy in Digital Rights Management Workshop, edtied by ACM Workshop, Philadelphia (2001) in press.

Google Scholar

[8] Zhenjun Tang, etc: Journal of Ubiquitous Convergence and Technology Vol. 2 (2008), p.18.

Google Scholar