A Review of Robust Hashing Methods for Content Based Image Authentication

Lokanadham Naidu Vadlamudi*, V. V. Rama Prasad**, D. Vasumathi***
* Assistant Professor, Department of Information Technology, Sree Vidyanikethan Engineering College, Andhra Pradesh, India.
** Professor, Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Andhra Pradesh, India.
*** Professor, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Telangana, India.
Periodicity:October - December'2016

Abstract

At present, the multimedia data will be transmitted rapidly using an internet. But, whether the data reaches the recipient without tampering is questionable. The current multimedia editing software allows adversaries to alter multimedia data without changing its visual perception. Different categories of approaches exist for verifying the integrity as well as authenticity of multimedia data. The Content Based Authentication (CBA) is one among them. This review paper describes various Content Based Image Authentication (CBIA) methods, which have been developed for integrity verification of images. And also, this paper summarizes various techniques used in existing image authentication methods to extract robust features. In addition, this paper discusses the important characteristics of a CBIA approach, limitations of existing methods and future research directions. The development of robust and secure image authentication method for content authentication is still an open challenge for current researchers.

Keywords

Content Based Image Authentication, Image Hashing, Integrity Verification, Robustness, Fragility.

How to Cite this Article?

Vadlamudi, L. N., Vaddella, R. P. V., and Devara, V. (2016). A Review Of Robust Hashing Methods For Content Based Image Authentication. i-manager's Journal on Image Processing, 3(4), 38-45.

References

[1]. Yong Soo Choi and Jong Hyuk Park, (2012). “Image Hash Generation Method using Hierarchical Histogram”. Journal of Multimedia Tools and Applications, Vol. 61, No. 1, pp. 181-194.
[2]. Rui Sun and Wenjun Zeng, (2012). “Secure and Robust Image Hashing via Compressive Sensing”. Journal of Multimedia Tools and Applications, Vol. 70, No. 3, pp. 1- 15.
[3]. Guangjie Liu, et al. (2011). “A Passive Image Authentication Scheme for Detecting Region Duplication Forgery with Rotation”. Journal of Network and Computer Applications, Vol. 34, No. 5, pp. 1557-1565.
[4]. Shijun Xiang and Hyoung Joong Kim, (2011). “Histogram Based Image Hashing for Searching Content- Preserving Copies”. Transactions on Data Hiding Multimedia Security VI, Vol. 6730, pp. 83-108.
[5]. Li Weng and Bart Preneel, (2011). “A Secure Perceptual Hash Algorithm for Image Content Authentication”. Communications and Multimedia Security, Vol. 7025, pp. 108-121.
[6]. Yanqiang Lei, Yuangen Wang, and Jiwu Huang, (2011). “Robust Image Hash in Radon Transform domain for Authentication”. Journal of Signal Processing: Image Communication, Vol. 26, No. 6, pp. 280-288.
[7]. Zhihua Xu, et al. (2011). “A Novel Image Copy Detection Scheme Based on the Local Multi-resolution Histogram Descriptor”. Journal of Multimedia Tools and Applications, Vol. 52, No. 2-3, pp. 445-463.
[8]. Zhenjun Tang, et al. (2011). “Lexicographical Framework for Image Hashing with Implementation based on DCT and NMF”. Journal of Multimedia Tools and Applications, Vol. 52, No. 2-3, pp. 325-345.
[9]. Lina Wang, et al. (2011). “Image Authentication based on Perceptual Hash using Gabor Filters”. Journal of Soft Computing, Vol. 15, No. 3, pp. 493-504.
[10]. Nighat Jamil and Arshad Aziz, (2010). “A Unified Approach to Secure and Robust Hashing Scheme for  Image and Video Authentication”. In Proc. of 3rd Int. Congress on Image and Signal Processing (CISP-2010), pp. 274-278.
[11]. Shui-Hua Han and Chao-Hsien Chu, (2010). “Content-based Image Authentication: Current Status, Issues and Challenges”. International Journal of Information Security, Vol. 9, No. 1, pp. 19-32.
[12]. Fawad Ahmed, M.Y. Siyal, and Vali Uddin Abbas, (2010). “A Secure and Robust Hash-Based Scheme for Image Authentication”. Journal of Signal Processing, Vol.90, No. 5, pp. 1456-1470.
[13]. Yang Ou, Chul Sur, and Kyung Hyune Rhee, (2010). “Discriminative Image Hashing Based on Region of Interest”. In Proc. of 16 Int. Conf. on Advances in Multimedia Modeling, Vol. 5916, pp 701-706.
[14]. Ammar M. Hassan, et al. (2009). “Semi Fragile Image Authentication using Robust Image Hashing with Localization”. In Proc. of Second International Conf. on Machine Vision (ICMV-09), pp. 133-137.
[15]. Marco Tagliasacchi, et al. (2009). “Hash-Based Identification of Spare Image Tampering”. IEEE Trans. on Image Processing, Vol. 18, No. 11, pp. 2491-2504.
[16]. Han-Ling Zhang, et al. (2009). “Content Based Image Hashing Robust to Geometric Transformation”. In Proc. of Second Int. Symposium on Electronic Commerce and Security (ISECS-09), pp. 105-108.
[17]. S.M. Saad, (2009). “Design of a Robust and Secure Digital Signature Scheme for Image Authentication over Wireless Channels”. IET Information Security, Vol. 3, No. 1, pp. 1-8.
[18]. Adil Haouzia and Rita Noumeir, (2008). “Methods for image authentication: A Survey”. Journal of Multimedia Tools Applications, Vol. 39, No. 1, pp. 1-46.
[19]. Swinathan Ashwin, et at. (2006). “Robust and Secure Image Hashing”. IEEE Trans on Inf. Forensics and Security, Vol.1, No. 2, pp. 215-230.
[20]. Shijun Xiang, et al. (2007). “Histogram based Image Hashing Scheme Robust against Geometric  Deformations”. In Proc. of 9th International Workshop on Multimedia and Security (MMS-07), pp. 121-128.
[21]. Vishal Monga and M. Kivac Mihcak, (2007). “Robust and Secure Image Hashing via Non–Negative Matrix Factorizations”. IEEE Transaction on Information Forensics and Security, Vol. 2, No. 3, pp. 376-390.
[22]. Kai Chen, Xingleizhu, and Zhishou Zhang, (2007). “A Hybrid Content-Based Image Authentication Scheme”. In Proc. of Advances in Multimedia Information Processing (PCM-2007), Vol. 4810, pp. 226-235.
[23]. Young-Dong Zhang, et al. (2007). “Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication”. Journal of Computer Science and Technology, Vol. 22, No. 4, pp. 523-526.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.