Abstract
Nowadays, many image-editing tools have emerged. So image authentication has become an emergency issue in the digital world, since images can be easily tampered. Image hash functions are one of the efficient methods used for detecting this type of tampering. Image hashing is a technique that extracts a short sequence from the image that represents the content of the image and thus can be used for image authentication. This method proposes an image hash that is formed using both the global and local features of the image. The Haralick texture features are used as the local feature. The global features are based on the Zernike moments of the luminance and the chrominance component. This robust hashing scheme can detect image forgery such as insertion and deletion of the objects. The features are extracted from the blocks of the image and so can detect forgery in small areas of the image also. The proposed hash is robust to common content-preserving modifications and sensitive to malicious manipulations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Monga V, Banerjee A, Evans BL (2006) A clustering based approach to perceptual image hashing. IEEE Trans Inf Forensic Secur 1(1):68–79
Xiang S (2007) Histogram based image hashing scheme robust against geometric deformations. In: Proceedings of the ACM multimedia and security workshop, New York, pp 121–128, 2007
Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using non-negative matrix factorization. J Ubiquitious Convergenge Technol 2(1):18–26
Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hash. IEEE Trans Inf Forensic Security 1(2):215–230
Lei Y, Wanga Y, Huang J (2011) Robust image hash in Randomn transform domain for authentication. Signal Process: Image Commun 26(6):280–288
Khelfi F, Jiang J (2010) Perceptual image hashing based on virtual watermark detection. Trans Image Process 19(4):981–994
Tang Z, Wang S, Zhang X, Wei W, Zahoe Y (2011) Lexiographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools Appl 52(2–3):325–345
Tang Z, Wang S, Zhang X, Wei W, Zahoe Y (2011) Lexiographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools Appl 52(2–3):325–345
Tang Z, Xianquan Z, Huang L, Dai Y (2013) Robust image hashing using ring based entropies. Sig Process 93(7):2061–2069
Swaminathan A, Mao Y, Wu M (2004) Image hashing resilient to geometric and filtering operations. In: IEEE workshop on multimedis signal processing, Siena Italy, 2004
Schnand M, Changeider SF (1996) A robust content based digital signature for image authentication. In: Proceedings of the IEEE international conference on image processing, vol 3, Lausanne, Switzerland, 1996, pp 227–230
Lu C-S, Hsu C-Y (2005) Geometric distortion resilent image hashing scheme and its application on copy detection and authentication. Multimedia Syst 11(2):159–173
Zhao Y, Wang S, Zhang X, Yao H Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Security 8(1)
Acknowledgments
I am thankful to Mr. Jyothish K John, Senior Assistant Professor of Computer Science department, FISAT, Kerala for his keen interest and useful guidance in my paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Soman, G., John, J.K. (2016). Block-Based Forgery Detection Using Global and Local Features. In: Suresh, L., Panigrahi, B. (eds) Proceedings of the International Conference on Soft Computing Systems. Advances in Intelligent Systems and Computing, vol 397. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2671-0_14
Download citation
DOI: https://doi.org/10.1007/978-81-322-2671-0_14
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2669-7
Online ISBN: 978-81-322-2671-0
eBook Packages: EngineeringEngineering (R0)