DocumentCode :
80880
Title :
A Visual Model-Based Perceptual Image Hash for Content Authentication
Author :
Xiaofeng Wang ; Kemu Pang ; Xiaorui Zhou ; Yang Zhou ; Lu Li ; Jianru Xue
Author_Institution :
Shaanxi Key Lab. for Network Comput. & Security Technol., Xi´an Univ. of Technol., Xi´an, China
Volume :
10
Issue :
7
fYear :
2015
fDate :
Jul-15
Firstpage :
1336
Lastpage :
1349
Abstract :
Perceptual image hash has been widely investigated in an attempt to solve the problems of image content authentication and content-based image retrieval. In this paper, we combine statistical analysis methods and visual perception theory to develop a real perceptual image hash method for content authentication. To achieve real perceptual robustness and perceptual sensitivity, the proposed method uses Watson´s visual model to extract visually sensitive features that play an important role in the process of humans perceiving image content. We then generate robust perceptual hash code by combining image-block-based features and key-point-based features. The proposed method achieves a tradeoff between perceptual robustness to tolerate content-preserving manipulations and a wide range of geometric distortions and perceptual sensitivity to detect malicious tampering. Furthermore, it has the functionality to detect compromised image regions. Compared with state-of-the-art schemes, the proposed method obtains a better comprehensive performance in content-based image tampering detection and localization.
Keywords :
authorisation; content-based retrieval; cryptography; feature extraction; image coding; statistical analysis; visual perception; Watson visual model; content-based image retrieval; content-based image tampering detection; content-based image tampering localization; content-preserving manipulations; geometric distortions; image content authentication; image-block-based features; key-point-based features; malicious tampering; perceptual robustness; perceptual sensitivity; real perceptual image hash method; robust perceptual hash code; statistical analysis methods; visual model-based perceptual image hash; visual perception theory; visually sensitive feature extraction; Authentication; Discrete cosine transforms; Feature extraction; Image coding; Robustness; Sensitivity; Visualization; Content authentication; Perceptual image hash; Tampering detection; Tampering localization; Watson’s visual model; Watson???s visual model; content authentication; tampering detection; tampering localization;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2015.2407698
Filename :
7050251
Link To Document :
بازگشت