Image Distortion Estimation by Hash Comparison

  • Li Weng
  • Bart Preneel
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6523)


Perceptual hashing is conventionally used for content identification and authentication. In this work, we explore a new application of image hashing techniques. By comparing the hash values of original images and their compressed versions, we are able to estimate the distortion level. A particular image hash algorithm is proposed for this application. The distortion level is measured by the signal to noise ratio (SNR). It is estimated from the bit error rate (BER) of hash values. The estimation performance is evaluated by experiments. The JPEG, JPEG2000 compression, and additive white Gaussian noise are considered. We show that a theoretical model does not work well in practice. In order to improve estimation accuracy, we introduce a correction term in the theoretical model. We find that the correction term is highly correlated to the BER and the uncorrected SNR. Therefore it can be predicted using a linear model. A new estimation procedure is defined accordingly. New experiment results are much improved.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proc. of International Conference on Image Processing (ICIP 1996), vol. 3, pp. 227–230 (1996)Google Scholar
  2. 2.
    Fridrich, J.: Robust bit extraction from images. In: Proc. of IEEE International Conference on Multimedia Computing and Systems, vol. 2, pp. 536–540 (1999)Google Scholar
  3. 3.
    Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1(2), 215–230 (2006)CrossRefGoogle Scholar
  4. 4.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons, Chichester (1996)MATHGoogle Scholar
  5. 5.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefMATHGoogle Scholar
  6. 6.
    Roy, S., Sun, Q.: Robust hash for detecting and localizing image tampering. In: Proc. of International Conference on Image Processing, vol. 6, pp. 117–120 (2007)Google Scholar
  7. 7.
    Tagliasacchi, M., Valenzise, G., Tubaro, S.: Hash-based identification of sparse image tampering. IEEE Transactions on Image Processing 18(11), 2491–2504 (2009)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Lu, W., Varna, A., Wu, M.: Forensic hash for multimedia information. In: Proc. of SPIE Media Forensics and Security Conference (2010)Google Scholar
  9. 9.
    Doets, P.J.O., Lagendijk, R.L.: Distortion estimation in compressed music using only audio fingerprints. IEEE Transactions on Information Forensics and Security 16(2), 302–317 (2008)Google Scholar
  10. 10.
    Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing 13(4), 600–612 (2004)CrossRefGoogle Scholar
  11. 11.
    Brooks, A., Pappas, T.: Using structural similarity quality metrics to evaluate image compression techniques. In: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2007, April 15-20, vol. 1, pp. I-873–I-876 (2007)Google Scholar
  12. 12.
    Haitsma, J., Kalker, T.: A highly robust audio fingerprinting system. In: Proc. of 3rd International Conference on Music Information Retrieval, pp. 107–115 (October 2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Li Weng
    • 1
  • Bart Preneel
    • 1
  1. 1.ESAT/COSIC-IBBTKatholieke Universiteit LeuvenBelgium

Personalised recommendations