CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Feature based Image Authentication using Symmetric Surround Saliency Mapping in Image Forensics

by Meenakshi Sundaram A., C. Nandini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 13
Year of Publication: 2014
Authors: Meenakshi Sundaram A., C. Nandini
10.5120/18266-9289

Meenakshi Sundaram A., C. Nandini . Feature based Image Authentication using Symmetric Surround Saliency Mapping in Image Forensics. International Journal of Computer Applications. 104, 13 ( October 2014), 43-51. DOI=10.5120/18266-9289

@article{ 10.5120/18266-9289,
author = { Meenakshi Sundaram A., C. Nandini },
title = { Feature based Image Authentication using Symmetric Surround Saliency Mapping in Image Forensics },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 13 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 43-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number13/18266-9289/ },
doi = { 10.5120/18266-9289 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:06.559560+05:30
%A Meenakshi Sundaram A.
%A C. Nandini
%T Feature based Image Authentication using Symmetric Surround Saliency Mapping in Image Forensics
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 13
%P 43-51
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For an efficient image security, image hashing is one of the solutions for image authentication. A robust image hashing mechanism must be robust to image processing operations as well as geometric distortions. A better hashing technique must ensure an efficient detection of image forgery like insertion, deletion, replacement of objects, malicious color tampering, and for locating the exact forged areas. This paper describes a novel image hash function, which is generated by using both global and local features of an image. The global features are the representation of Zernike moments on behalf of luminance and chrominance components of the image as a whole. The local features include texture information as well as position of significant regions of the image. The secret keys can be introduced into the system, in places like feature extraction and hash formulation to encrypt the hash. The hash incorporation into the system is found very sensitive to abnormal image modifications and hence robust to splicing and copy-move type of image tampering and, therefore, can be applicable to image authentication. As in the generic system, the hashes of the reference and test images are compared by finding the hamming or hash distance. By setting the thresholds with the distance, the received image can be stated as authentic or non-authentic. And finally location of forged regions and type of forgery are found by decomposing the hashes. Compared to most recent work done in this area, our algorithm is simple and cost effective with better scope of security.

References
  1. Swaminathan,A. , Mao,Y. , Wu, M. 2006. Robust and Secure Image Hashing. IEEE transaction On Info. Forensics and Security. Vol. 1, No, 2, pp. 215-230
  2. Xiang, S. , Yang, J. 2012. Block-Based Image Hashing With Restricted Blocking Strategy For Rotational Robustness. EURASIP Journal on Advances in Signal Processing
  3. Kasza,P. 2009. Pseudo-Zernike Moments for Feature Extraction and Chinese Character Recognition. IEEE International Conference on Computer Automation & Engineering
  4. The, C. H. , Chin, R. T. 1988. On Image Analysis By The Methods Of Moments. IEEE Transactions on Pattern Analysis and Machine Intelligence. Vol. 10, Iss. 4, pp:496–513
  5. Hou,X. , Zhang, L. 2007. Saliency detection: A Spectral Residual Approach. Proc. IEEE Int. Conf. Computer Vision and Pattern Recognition, Minneapolis, pp. 1–8
  6. Achanta,R. , Susstrunk,S. 2007. Saliency Detection Using Maximum Symmetric Surround. International Conference On Computer Vision Systems
  7. Tamura,H. , Mori,S. , Yamawaki, T. 1978. Textural Features Corresponding To Visual Perception. IEEE Trans. Syst. , Man, Cybern. Vol. 8, No. 6, pp. 460–472
  8. Zhao,Y. , Wang, S. , Zhang, X. , Yao, H. 2013. Robust Hashing for Image Authentication Using Zernike Moments and Local Features. IEEE Transactions On Information Forensics And Security, Vol. 8, No. 1
  9. Ahmed,F. , Siyal, M. Y. , Abbas, V. U. 2010. A Secure And Robust Hash Based Scheme For Image Authentication. Signal Process. Vol. 90, No. 5, pp. 1456–1470
  10. Tang, Z. , Wang, S. , Zhang, X. , Wei, W. , Su, S. 2008. Robust Image Hashing For Tamper Detection Using Non-Negative Matrix Factorization. Journal of Ubiquitous Convergence Technol. Vol. 2, No. 1, pp. 18–26
  11. Monga,V. , Mihcak, M. K. 2007. Robust And Secure Image Hashing Via Non-Negative Matrix Factorizations. IEEE Trans. Inf. Forensics Security. Vol. 2, No. 3, pp. 376–390
  12. Fouad, K. , Jianmin, J. 2010. Analysis Of The Security Of Perceptual Image Hashing Based On Non-Negative Matrix Factorization. IEEE Signal Process. Lett. , Vol. 17, No. 1, pp. 43–46
  13. Tang, Z. , Wang, S. , Zhang, X. , Wei, W. , Zhao, Y. 2011. Lexicographical Framework For Image Hashing With Implementation Based On DCT And NMF. Multimedia Tools Applicat. , Vol. 52, No. 2–3, pp. 325–345
  14. Ahmed,F. , Siyal, M. Y. , Abbas, V. U. 2010. A Secure And Robust Hash based Scheme For Image Authentication. Signal Process, Vol. 90, No. 5, pp. 1456–1470
  15. Lv,X. , Wang, Z. J. 2012. Perceptual Image Hashing Based On Shape Contexts And Local Feature Points. IEEE Trans. Inf. Forensics Security. Vol. 7, No. 3, pp. 1081–1093
  16. Mihçak,M. K. , Koval,O. , Voloshynovskiy, S. 2007. Robust Perceptual Hashing Of Multimedia Content. EURASIP, Special
  17. Tang,Z. , Wang, S. , W. Wei, X, Su,S. 2008. Robust image hashing for tamper detection using non-negative matrix factorization. Ubiquitous Convergence Technol. , Vol. 2, No. 1, pp. 18–26
  18. Swaminathan. , Wu, M. 2006. Robust and secure image hashing. IEEE Trans. Inf. Forensics Security
  19. Fridrich,J. , Goljan, M. 2000. Robust hash functions for digital watermarking. Proc IEEE International Conf Information Technology: Coding Computing, Las Vegas, NV , USA, pp. 178–183
  20. Venkatesan, R. , Koon, S. M. 1999. Robust image hashing into binary strings. manuscript
  21. Manudhane, K. , Bartere, M. M. 2013. Methodology for Evidence Reconstruction in Digital Image Forensics. Computer Engineering and Intelligent Systems. Vol. 4, No. 13
  22. Qershi, A. , Osamah, M. , Khoo. B. E. 2013. Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic science international, Vol. 23, No. 1, pp. 284-295
  23. Chang,E-C. , Kankanhalli, M. S. , Guan, X. , Huang, Z. , Wu, Y. 2003. Robust image authentication using content based compression. Multimedia Systems, Vol. 9, No. 2, pp. 121-130
  24. Ahmed,F. ,Moskowitz. I. S. 2004. Correlation-based watermarking method for image authentication applications. Optical Engineering, Vol. 43, No. 8, pp. 1833-1838
  25. Lu,C-S. , Liao, H-Y. M. 2003. Structural digital signature for image authentication: an incidental distortion resistant scheme. Multimedia, IEEE Transactions, Vol. 5, No. 2, pp. 161-173
  26. Lee, S-K. , Suh, Y-H. , Ho, Y-S. 2006. Reversible Image Authentication Based on Watermarking. IEEE International Conference In Multimedia and Expo,, pp. 1321-1324
  27. Singh, H. A. , Gayathri, R. 2012. Image Authentication Technique Using Fsim Algorithm. International Journal of Engineering Research and Applications (IJERA), Vol. 2, No. 2, pp. 1129-1133
  28. A. Tiwari, M. Sharma, "Semifragile Watermarking Schemes for Image Authentication- A Survey", International Journal of Computer Network and Information Security, Vol. 2, pp. 43-49, 2012
  29. SriSwathi, K. , Krishna, S. G. 2011. Secure Digital signature scheme for Image authentication over wireless channels. International Journal of Computer Technology and Applications, Vol. 2 (5), pp. 1472-1479
  30. Puhan, N. B. , Ho, A. T. S. 2005. Secure tamper localization in binary document image authentication. In Knowledge-Based Intelligent Information and Engineering Systems, Springer Berlin Heidelberg, pp. 263-271
  31. Hirakawa, Y. , Take, M. , Ohzeki. K. 2011. Pass-image authentication method tolerant to video-recording attacks. Computer Science and Information Systems (FedCSIS), Federated Conference, pp. 767-773
  32. Bhattacharya, T. , Hore, S. , Chaudhuri, B. 2012. An Image Authentication Technique by Handwritten Signature Verification using DWT and ANN. International Journal of Computer Applications. Vol. 47(21)
  33. Hassan, A. M. . , Hasan, M. Y. , Wahab, M. A. A. 2012. A New Vector Quantization Attack on Self-Recovery Image Authentication. Second International Conference on Communications and Information Technology
  34. Sathik, M. M. , Sujatha, S. S. 2012. Authentication of Digital Images by using a semi-Fragile Watermarking Technique. International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 2, Issue. 11
  35. http://forensics. idealtest. org:8080/
  36. Zhao, Y. , Wang, S. , Zhang, X. , Yao, H. 2013. Robus1t Hashing for Image Authentication Using Zerbike Moments and Local Features. IEEE Transaction on Information Forensics and Security, Vol. 8, No. 1
Index Terms

Computer Science
Information Sciences

Keywords

Zernike moments Forgery detection SHA-1 MD5 Image hash Salient detection