Skip to main content

Block-Based Forgery Detection Using Global and Local Features

  • Conference paper
  • First Online:
Proceedings of the International Conference on Soft Computing Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 397))

Abstract

Nowadays, many image-editing tools have emerged. So image authentication has become an emergency issue in the digital world, since images can be easily tampered. Image hash functions are one of the efficient methods used for detecting this type of tampering. Image hashing is a technique that extracts a short sequence from the image that represents the content of the image and thus can be used for image authentication. This method proposes an image hash that is formed using both the global and local features of the image. The Haralick texture features are used as the local feature. The global features are based on the Zernike moments of the luminance and the chrominance component. This robust hashing scheme can detect image forgery such as insertion and deletion of the objects. The features are extracted from the blocks of the image and so can detect forgery in small areas of the image also. The proposed hash is robust to common content-preserving modifications and sensitive to malicious manipulations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Monga V, Banerjee A, Evans BL (2006) A clustering based approach to perceptual image hashing. IEEE Trans Inf Forensic Secur 1(1):68–79

    Google Scholar 

  2. Xiang S (2007) Histogram based image hashing scheme robust against geometric deformations. In: Proceedings of the ACM multimedia and security workshop, New York, pp 121–128, 2007

    Google Scholar 

  3. Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using non-negative matrix factorization. J Ubiquitious Convergenge Technol 2(1):18–26

    Google Scholar 

  4. Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hash. IEEE Trans Inf Forensic Security 1(2):215–230

    Google Scholar 

  5. Lei Y, Wanga Y, Huang J (2011) Robust image hash in Randomn transform domain for authentication. Signal Process: Image Commun 26(6):280–288

    Google Scholar 

  6. Khelfi F, Jiang J (2010) Perceptual image hashing based on virtual watermark detection. Trans Image Process 19(4):981–994

    Article  MathSciNet  Google Scholar 

  7. Tang Z, Wang S, Zhang X, Wei W, Zahoe Y (2011) Lexiographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools Appl 52(2–3):325–345

    Article  Google Scholar 

  8. Tang Z, Wang S, Zhang X, Wei W, Zahoe Y (2011) Lexiographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools Appl 52(2–3):325–345

    Article  Google Scholar 

  9. Tang Z, Xianquan Z, Huang L, Dai Y (2013) Robust image hashing using ring based entropies. Sig Process 93(7):2061–2069

    Article  Google Scholar 

  10. Swaminathan A, Mao Y, Wu M (2004) Image hashing resilient to geometric and filtering operations. In: IEEE workshop on multimedis signal processing, Siena Italy, 2004

    Google Scholar 

  11. Schnand M, Changeider SF (1996) A robust content based digital signature for image authentication. In: Proceedings of the IEEE international conference on image processing, vol 3, Lausanne, Switzerland, 1996, pp 227–230

    Google Scholar 

  12. Lu C-S, Hsu C-Y (2005) Geometric distortion resilent image hashing scheme and its application on copy detection and authentication. Multimedia Syst 11(2):159–173

    Article  Google Scholar 

  13. Zhao Y, Wang S, Zhang X, Yao H Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Security 8(1)

    Google Scholar 

Download references

Acknowledgments

I am thankful to Mr. Jyothish K John, Senior Assistant Professor of Computer Science department, FISAT, Kerala for his keen interest and useful guidance in my paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gayathri Soman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Soman, G., John, J.K. (2016). Block-Based Forgery Detection Using Global and Local Features. In: Suresh, L., Panigrahi, B. (eds) Proceedings of the International Conference on Soft Computing Systems. Advances in Intelligent Systems and Computing, vol 397. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2671-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2671-0_14

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2669-7

  • Online ISBN: 978-81-322-2671-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics