image authentication using lbp-based perceptual image hashing

Authors

r. davarzani

s. mozaffari

kh. yaghmaie

abstract

feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of local binary pattern features. in this paper, we investigate the use of local binary patterns for perceptual image hashing. in feature extraction, we propose to use both sign and magnitude information of local differences. so, the algorithm utilizes a combination of gradient-based and lbp-based descriptors for feature extraction. to provide security needs, two secret keys are incorporated in feature extraction and hash generation steps. performance of the proposed hashing method is evaluated with an important application in perceptual image hashing scheme: image authentication. experiments are conducted to show that the present method has acceptable robustness against perceptual content-preserving manipulations. moreover, the proposed method has this capability to localize the tampering area, which is not possible in all hashing schemes.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

full text

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will lead to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for perce...

full text

Robust Image Content Authentication Using Perceptual Hashing and Watermarking

Perceptual hashing is a promising tool for multimedia content authentication. Digital watermarking is a convenient way of data hiding. By combining the two, we get a more efficient and versatile solution. In a typical scenario, multimedia data is sent from a server to a client. The corresponding hash value is embedded in the data. The data might undergo incidental distortion and malicious modif...

full text

Perceptual Image Hashing

With the fast advancement of computer, multimedia and network technologies, the amount of multimedia information that is conveyed, broadcast or browsed via digital devices has grown exponentially. Simultaneously, digital forgery and unauthorized use have reached a significant level that makes multimedia authentication and security very challenging and demanding. The ability to detect changes in...

full text

Compressed Image Hashing using Minimum Magnitude CSLBP

Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...

full text

Grayscale Image Authentication using Neural Hashing

Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication. The suggested system is rapid, robust, useful and secure. Proposed hash function generates hash values using neural network one-way property and non-linear techniques. As...

full text

My Resources

Save resource for easier access later


Journal title:
journal of ai and data mining

Publisher: shahrood university of technology

ISSN 2322-5211

volume 3

issue 1 2015

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023