Advertisement

A Fine-Grained Authentication Model Based on Perceptual Hashing and Grid Descriptor for Remote Sensing Image

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 288)

Abstract

In this paper, a fine-grained authentication model for remote sensing image based on perceptual hashing and grid descriptor is proposed. Most perceptual hashing algorithms generate the hash value from an image’s global features, while remote sensing images are generally of huge amount and large size, so they are not suitable for remote sensing images authentication applications with high security demand. In this work, we apply grid descriptor to divide a remote sensing image, then generate the perceptual hash value of each region, and organize these hash values by embedding them into the corresponding region with watermarking technique. The grid descriptor is applied to detect and represent the tamper of the image. Compared with other authentication algorithms, the model can authentically remote sense image with different granularity.

Keywords

Authentication Remote sensing image Perceptual hashing Grid descriptor 

Notes

Acknowledgments

This research is supported by the National Natural Science Foundation of China, No. 41071245; Research and Innovation Project for Graduates of Jiangsu Higher Education Institutions (CXLX13_378).

References

  1. 1.
    Schneider M, Chang SF (1996) A robust content based digital signature for image authentication. Proc IEEE Int Conf Image Process 3:227–230CrossRefGoogle Scholar
  2. 2.
    Chang L, Yan WG, Wang WD (2012) Research on robust image perceptual hashing technology based on discrete cosine transform. In: Business, Economics, Financial Sciences, and Management. Springer, Berlin, Heidelberg, pp 799–809Google Scholar
  3. 3.
    Christophe D, Delaigle J, Macq B (2002) Invisibility and application functionalities in perceptual watermarking: an overview. Proc IEEE 90(1):64–77 Google Scholar
  4. 4.
    Zhang D, Lu G (2004) Review of shape representation and description techniques. Pattern Recogn 37(1):1–19CrossRefMATHGoogle Scholar
  5. 5.
    Lu G, Sajjanhar A (1999) Region-based shape representation and similarity measure suitable for content-based image retrieval. Multimedia Syst 7(2):165–174CrossRefGoogle Scholar
  6. 6.
    Menezes A, van Oorschot P, Vanstone S (1996) Handbook of applied cryptography. CRC Press, Boca RatonCrossRefGoogle Scholar
  7. 7.
    Cho SY, Han SY (2003) Wavelet packet based digital watermarking for remote sensing image compression. In: Computer and information sciences (ISCIS 2003). Springer, Berlin, Heidelberg, pp 482–489Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Key Laboratory of Virtual Geographic Environment of Ministry of EducationNanjing Normal UniversityNanjingPeople’s Republic of China

Personalised recommendations