image authentication using lbp-based perceptual image hashing
Authors
abstract
feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of local binary pattern features. in this paper, we investigate the use of local binary patterns for perceptual image hashing. in feature extraction, we propose to use both sign and magnitude information of local differences. so, the algorithm utilizes a combination of gradient-based and lbp-based descriptors for feature extraction. to provide security needs, two secret keys are incorporated in feature extraction and hash generation steps. performance of the proposed hashing method is evaluated with an important application in perceptual image hashing scheme: image authentication. experiments are conducted to show that the present method has acceptable robustness against perceptual content-preserving manipulations. moreover, the proposed method has this capability to localize the tampering area, which is not possible in all hashing schemes.
similar resources
Image authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
full textImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will lead to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for perce...
full textRobust Image Content Authentication Using Perceptual Hashing and Watermarking
Perceptual hashing is a promising tool for multimedia content authentication. Digital watermarking is a convenient way of data hiding. By combining the two, we get a more efficient and versatile solution. In a typical scenario, multimedia data is sent from a server to a client. The corresponding hash value is embedded in the data. The data might undergo incidental distortion and malicious modif...
full textPerceptual Image Hashing
With the fast advancement of computer, multimedia and network technologies, the amount of multimedia information that is conveyed, broadcast or browsed via digital devices has grown exponentially. Simultaneously, digital forgery and unauthorized use have reached a significant level that makes multimedia authentication and security very challenging and demanding. The ability to detect changes in...
full textCompressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
full textGrayscale Image Authentication using Neural Hashing
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication. The suggested system is rapid, robust, useful and secure. Proposed hash function generates hash values using neural network one-way property and non-linear techniques. As...
full textMy Resources
Save resource for easier access later
Journal title:
journal of ai and data miningPublisher: shahrood university of technology
ISSN 2322-5211
volume 3
issue 1 2015
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023