A Robust Forensic Hash Component for Image Alignment

  • Sebastiano Battiato
  • Giovanni Maria Farinella
  • Enrico Messina
  • Giovanni Puglisi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6978)


The distribution of digital images with the classic and newest technologies available on Internet (e.g., emails, social networks, digital repositories) has induced a growing interest on systems able to protect the visual content against malicious manipulations that could be performed during their transmission. One of the main problems addressed in this context is the authentication of the image received in a communication. This task is usually performed by localizing the regions of the image which have been tampered. To this aim the received image should be first registered with the one at the sender by exploiting the information provided by a specific component of the forensic hash associated with the image. In this paper we propose a robust alignment method which makes use of an image hash component based on the Bag of Visual Words paradigm. The proposed signature is attached to the image before transmission and then analyzed at destination to recover the geometric transformations which have been applied to the received image. The estimator is based on a voting procedure in the parameter space of the geometric model used to recover the transformation occurred to the received image. Experiments show that the proposed approach obtains good margin in terms of performances with respect to state-of-the art methods.


Image forensics Forensic hash Bag of Visual Word Tampering Geometric transformations Image validation and authentication 


  1. 1.
    Farid, H.: Digital doctoring: how to tell the real from the fake. Significance 3(4), 162–166 (2006)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Battiato, S., Farinella, G.M., Messina, E., Puglisi, G.: Understanding Geometric Manipulations of Images Through BOVW-Based Hashing. In: IEEE International Workshop on Content Protection & Forensics, held in conjunction with the IEEE International Conference on Multimedia & Expo (2011)Google Scholar
  3. 3.
    Lin, Y.-C., Varodayan, D., Girod, B.: Image authentication based on distributed source coding. In: IEEE International Conference on Image Processing, pp. 3–8 (2007)Google Scholar
  4. 4.
    Roy, S., Sun, Q.: Robust hash for detecting and localizing image tampering. In: IEEE International Conference on Image Processing, pp. 117–120 (2007)Google Scholar
  5. 5.
    Lu, W., Varna, A.L., Wu, M.: Forensic hash for multimedia information. In: IS&T-SPIE Electronic Imaging Symposium - Media Forensics and Security (2010)Google Scholar
  6. 6.
    Lu, W.J., Wu, M.: Multimedia forensic hash based on visual words. In: IEEE International Conference on Image Processing, pp. 989–992 (2010)Google Scholar
  7. 7.
    Szeliski, R.: Image alignment and stitching: A tutorial. Foundations and Trends in Computer Graphics and Computer Vision 2(1), 1–104 (2006)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Csurka, G., Dance, C.R., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: ECCV International Workshop on Statistical Learning in Computer Vision (2004)Google Scholar
  9. 9.
    Lowe, D.: Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision 60(2), 91–110 (2004)CrossRefGoogle Scholar
  10. 10.
    Lazebnik, S., Schmid, C., Ponce, J.: Beyond bags of features: Spatial pyramid matching for recognizing natural scene categories. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2169–2178 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Sebastiano Battiato
    • 1
  • Giovanni Maria Farinella
    • 1
  • Enrico Messina
    • 1
  • Giovanni Puglisi
    • 1
  1. 1.Image Processing Laboratory, Department of Mathematics and Computer ScienceUniversity of CataniaCataniaItalia

Personalised recommendations