Compression Tolerant DCT Based Image Hash
نویسندگان
چکیده
With the advent of Internet image authentication has become a central part of research in security. Since JPEG has recommended discrete cosine transform as one of the steps in image compression systems, a hash function which utilizes discrete cosine decomposition is desirable. In this paper, we propose a discrete cosine based hash function which distinguishes acceptable level of compression from image processing modifications such as Median filtering, Gaussian noise addition, and FMLR attack. To increase manipulation detection, we optimize the number of AC coefficients needed in smoothing. Disciplines Physical Sciences and Mathematics Publication Details This article was originally published as: Kailasanathan, C, Safavi-Naini, R & Ogunbona, P, Compression tolerant DCT based image hash, Proceedings 23rd International Conference on Distributed Computing Systems Workshops, 19-22 May 2003, 562-567. Copyright IEEE 2003. This conference paper is available at Research Online: http://ro.uow.edu.au/infopapers/174
منابع مشابه
Hybrid DWT-DCT-Hash function based Digital Image Watermarking for Copyright Protection and Content Authentication of DubaiSat-2 Images
This paper presents a new technique for copyright protection and content authentication of satellite images. The novelty in the presented approach consists in designing a hybrid Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and hash function based digital image watermarking. In this study, two watermarks are embedded in the cover image called robust copyright watermark and f...
متن کاملA DCT-Based Secure JPEG Image Authentication Scheme
The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding ...
متن کاملRobust Image Hashing Based on Statistical Invariance of DCT Coefficients
It is well-known that discrete cosine transform (DCT) coefficients can be statistically modeled as the generalized Gaussian distribution (GGD) whose shape parameters can be estimated by the maximum likelihood (ML) estimation method. This paper presents a novel image hashing scheme based on the statistical invariance of DCT coefficients, where we extract the invariant parameters with the modifie...
متن کاملCompressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کاملShape-adaptive DCT and Its Application in Region-based Image Coding
To get better and flexible performance, region-based image coding has been studied widely in the last few years. In region-based image coding, the whole image can be divided into two parts: region-of-interest (ROI) and background area. ROI is coded in low compression ratio, while background area is coded in high compression ratio. In this paper, shape-adaptive DCT (SA-DCT) for coding arbitraril...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003