A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis

  • Munkhbaatar Doyoddorj
  • Kyung-Hyune Rhee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6908)


Nowadays, digital images and videos have become increasingly popular over the Internet and bring great social impact to a wide audience. In the meanwhile, technology advancement allows people to easily alter the content of digital multimedia and brings serious concern on the trustworthiness of online multimedia information. In this paper, we propose a new framework for multimedia forensics by using compact side information based on reversible watermarking to reconstruct the processing history of a multimedia data. Particularly, we focus on a secure reversible watermarking to make the image hash more secure and robust. Moreover, we introduce an algorithm based on Radon transform and scale space theory to effectively estimate the parameters of geometric transforms and to detect local tampering. The experimental results show that the quality of the embedded image is very high and the positions of the tampered parts are identified correctly.


Secure Image hashing Radon transform Reversible Watermarking Forensic Analysis 


  1. 1.
    Venkatesen, R., Koon, S.M., Moulin, P.: Robust image hashing. In: Proc. of IEEE International Conference on Image Processing, vol. 3, pp. 664–666 (2000)Google Scholar
  2. 2.
    Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. on Information Forensics and Security 1(2), 215–230 (2006)CrossRefGoogle Scholar
  3. 3.
    Delp, E., Memon, N.: Special issue on forensics analysis of digital evidence. IEEE Signal Processing Magazine 26(2) (March 2009)Google Scholar
  4. 4.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. on Circuit and Systems for Video Technology 13, 890–896 (2003)CrossRefGoogle Scholar
  5. 5.
    Peiling, C., Junhong, L., Hongcai, Z.: Rotation and scaling invariant texture classification based on Radon transform and multi-scale analysis. Pattern Recognition Letters 27, 408–413 (2006)CrossRefGoogle Scholar
  6. 6.
    Lindeberg, T.: Scale space theory in computer vision. Kluwer Academic Publishers, Dordrecht (1994)Google Scholar
  7. 7.
  8. 8.
    Lu, W., Varna, A.l., Wu, M.: Forensic hash for multimedia information. In: Proc. of SPIE Media Forensic and Security, p. 7541 (2010)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Munkhbaatar Doyoddorj
    • 1
  • Kyung-Hyune Rhee
    • 2
  1. 1.Dept. of Information SecurityPukyong National UniversityBusanRepublic of Korea
  2. 2.Dept. of IT Convergence and Application EngineeringPukyong National UniversityBusanRepublic of Korea

Personalised recommendations