Block-Based Forgery Detection Using Global and Local Features

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 397)


Nowadays, many image-editing tools have emerged. So image authentication has become an emergency issue in the digital world, since images can be easily tampered. Image hash functions are one of the efficient methods used for detecting this type of tampering. Image hashing is a technique that extracts a short sequence from the image that represents the content of the image and thus can be used for image authentication. This method proposes an image hash that is formed using both the global and local features of the image. The Haralick texture features are used as the local feature. The global features are based on the Zernike moments of the luminance and the chrominance component. This robust hashing scheme can detect image forgery such as insertion and deletion of the objects. The features are extracted from the blocks of the image and so can detect forgery in small areas of the image also. The proposed hash is robust to common content-preserving modifications and sensitive to malicious manipulations.


Zernike moment Haralick texture features Image authentication Image forgery 


  1. 1.
    Monga V, Banerjee A, Evans BL (2006) A clustering based approach to perceptual image hashing. IEEE Trans Inf Forensic Secur 1(1):68–79Google Scholar
  2. 2.
    Xiang S (2007) Histogram based image hashing scheme robust against geometric deformations. In: Proceedings of the ACM multimedia and security workshop, New York, pp 121–128, 2007Google Scholar
  3. 3.
    Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using non-negative matrix factorization. J Ubiquitious Convergenge Technol 2(1):18–26Google Scholar
  4. 4.
    Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hash. IEEE Trans Inf Forensic Security 1(2):215–230Google Scholar
  5. 5.
    Lei Y, Wanga Y, Huang J (2011) Robust image hash in Randomn transform domain for authentication. Signal Process: Image Commun 26(6):280–288Google Scholar
  6. 6.
    Khelfi F, Jiang J (2010) Perceptual image hashing based on virtual watermark detection. Trans Image Process 19(4):981–994MathSciNetCrossRefGoogle Scholar
  7. 7.
    Tang Z, Wang S, Zhang X, Wei W, Zahoe Y (2011) Lexiographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools Appl 52(2–3):325–345CrossRefGoogle Scholar
  8. 8.
    Tang Z, Wang S, Zhang X, Wei W, Zahoe Y (2011) Lexiographical framework for image hashing with implementation based on DCT and NMF. Multimedia Tools Appl 52(2–3):325–345CrossRefGoogle Scholar
  9. 9.
    Tang Z, Xianquan Z, Huang L, Dai Y (2013) Robust image hashing using ring based entropies. Sig Process 93(7):2061–2069CrossRefGoogle Scholar
  10. 10.
    Swaminathan A, Mao Y, Wu M (2004) Image hashing resilient to geometric and filtering operations. In: IEEE workshop on multimedis signal processing, Siena Italy, 2004Google Scholar
  11. 11.
    Schnand M, Changeider SF (1996) A robust content based digital signature for image authentication. In: Proceedings of the IEEE international conference on image processing, vol 3, Lausanne, Switzerland, 1996, pp 227–230Google Scholar
  12. 12.
    Lu C-S, Hsu C-Y (2005) Geometric distortion resilent image hashing scheme and its application on copy detection and authentication. Multimedia Syst 11(2):159–173CrossRefGoogle Scholar
  13. 13.
    Zhao Y, Wang S, Zhang X, Yao H Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Security 8(1)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Computer Science and Engineering, Federal Institute of Science and TechnologyMahatma Gandhi UniversityAngamalyIndia

Personalised recommendations