• DocumentCode
    80880
  • Title

    A Visual Model-Based Perceptual Image Hash for Content Authentication

  • Author

    Xiaofeng Wang ; Kemu Pang ; Xiaorui Zhou ; Yang Zhou ; Lu Li ; Jianru Xue

  • Author_Institution
    Shaanxi Key Lab. for Network Comput. & Security Technol., Xi´an Univ. of Technol., Xi´an, China
  • Volume
    10
  • Issue
    7
  • fYear
    2015
  • fDate
    Jul-15
  • Firstpage
    1336
  • Lastpage
    1349
  • Abstract
    Perceptual image hash has been widely investigated in an attempt to solve the problems of image content authentication and content-based image retrieval. In this paper, we combine statistical analysis methods and visual perception theory to develop a real perceptual image hash method for content authentication. To achieve real perceptual robustness and perceptual sensitivity, the proposed method uses Watson´s visual model to extract visually sensitive features that play an important role in the process of humans perceiving image content. We then generate robust perceptual hash code by combining image-block-based features and key-point-based features. The proposed method achieves a tradeoff between perceptual robustness to tolerate content-preserving manipulations and a wide range of geometric distortions and perceptual sensitivity to detect malicious tampering. Furthermore, it has the functionality to detect compromised image regions. Compared with state-of-the-art schemes, the proposed method obtains a better comprehensive performance in content-based image tampering detection and localization.
  • Keywords
    authorisation; content-based retrieval; cryptography; feature extraction; image coding; statistical analysis; visual perception; Watson visual model; content-based image retrieval; content-based image tampering detection; content-based image tampering localization; content-preserving manipulations; geometric distortions; image content authentication; image-block-based features; key-point-based features; malicious tampering; perceptual robustness; perceptual sensitivity; real perceptual image hash method; robust perceptual hash code; statistical analysis methods; visual model-based perceptual image hash; visual perception theory; visually sensitive feature extraction; Authentication; Discrete cosine transforms; Feature extraction; Image coding; Robustness; Sensitivity; Visualization; Content authentication; Perceptual image hash; Tampering detection; Tampering localization; Watson’s visual model; Watson???s visual model; content authentication; tampering detection; tampering localization;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2015.2407698
  • Filename
    7050251