Skip to main content
Log in

Robust hash generation technique for content-based image authentication using histogram

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a robust hash technique for image content authentication using histogram is proposed. The histogram based hash techniques reported in the literature are robust against Content Preserving Manipulations as well as incidental distortion. The major drawback of these techniques is that, they are not sensitive to Content Changing Manipulations and also un-altered histogram image modifications. To overcome these drawbacks, we present a novel hash technique which divides the image into non-overlapped blocks and distributes histogram bins of the image block into larger containers based on the Partial Sum of pixel count of histogram bins. An intermediate hash is produced by computing the ratio of pixel count between two neighbouring containers. The intermediate image hash is obtained by concatenating intermediate hashes of image blocks. Finally, the intermediate image hash is normalized and randomly permuted with a secret key to produce a robust and secure hash. The results shows that, the proposed method performs better when compared to the existing methods against the Content Preserving manipulations. Besides, the proposed method is more sensitive to Content Changing manipulations as well as un-altered histogram image modifications. The performance results on image authentication indicate that, the proposed method has high discriminative capability and strong robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Ammar M. Hassan et al (2009) Semi fragile image authentication using robust image hashing with localization, in proc. of second int. Conf Mach Vis 133–137

  2. Black PE (2005) Fisher-Yates shuffle, dictionary of algorithms and data structures. Natl Inst Stand Technol, retrieved 2007

  3. Choi YS, Park JH (2012) Image hash generation method using hierarchical histogram. Int Multimedia Tools Appl 61(1):181–194

    Article  Google Scholar 

  4. Goljan M et al (2001),Distortion-free data embedding for images, in proc. of the 4th Int. Workshop Inf Hiding 25–27, pp 27–41

  5. Han S-H, Chu C-H (2010) Content-based image authentication: current status, issues and challenges. Int Inf Secur 9(1):19–32

    Article  Google Scholar 

  6. Han-Ling Zhang et al (2009) Content based image hashing robust to geometric transformation, in proc. of second Int. Symp Electron Commer Secur 105–108

  7. Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. J Multimedia Tools Appl 39(1):1–4

    Article  Google Scholar 

  8. Leest A et al (2003) Reversible image watermarking, in proceedings of the ICIP03. 2:731–734

  9. Lei Y et al (2011) Robust image hash in radon transform domain for authentication. J Signal Process Image Commun 26(6):280–288

    Article  Google Scholar 

  10. Wang L et al (2011) Image authentication based on perceptual hash using Gabor filters. J Soft Comput 15(3):493–504

    Article  Google Scholar 

  11. Liu G et al (2011) A passive image authentication scheme for detecting region duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565

    Article  Google Scholar 

  12. Matsuo T, Kaou K (2004) On parallel hash functions based on block ciphers. Proc IEICE Trans Fundam Electron Commun Comput Sci E87A(1):76–74

    Google Scholar 

  13. Nighat J, Arshad A (2010) A unified approach to secure and robust hashing scheme for image and video authentication, in proc. of 3rd Int. Congr Image and Sig Process 274–278

  14. Qi X, Qi J (2007) A robust content based digital image watermarking scheme. J Signal Process 87:1264–1280

    Article  MATH  Google Scholar 

  15. Saad SM (2009) Design of a robust and secure digital signature scheme for image authentication over wireless channels. IET Inf Security 3(1):1–8

    Article  Google Scholar 

  16. Xiang S et al. (2007), Histogram based image hashing scheme robust against geometric deformations, in proc. of 9 Int. Work Multimedia and Secur 121–128

  17. Skala V, Kucha M (2001) The hash function and the principle of duality. Proc Int Conf Comput Graph Int 200:167–174

    Google Scholar 

  18. Sun R, Zeng W (2012) Secure and robust image hashing via compressive sensing, in Int. J Multimedia Tools Appl 1–15

  19. Swaminathan A, Mao Y, Min W (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 2(1):215–230

    Article  Google Scholar 

  20. Weng L, Preneel B (2011) A secure perceptual hash algorithm for image content authentication. Commun Multimedia Secur LNCS 7025:108–121

    Article  Google Scholar 

  21. Xiang S, Kim HJ (2011) Histogram based image hashing for searching content-preserving copies. Trans Data Hiding Multimedia Secur VI LNCS 6730:83–108

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lokanadham Naidu Vadlamudi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vadlamudi, L.N., Vaddella, R.P.V. & Devara, V. Robust hash generation technique for content-based image authentication using histogram. Multimed Tools Appl 75, 6585–6604 (2016). https://doi.org/10.1007/s11042-015-2591-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2591-8

Keywords

Navigation