Abstract
In this paper, a robust hash technique for image content authentication using histogram is proposed. The histogram based hash techniques reported in the literature are robust against Content Preserving Manipulations as well as incidental distortion. The major drawback of these techniques is that, they are not sensitive to Content Changing Manipulations and also un-altered histogram image modifications. To overcome these drawbacks, we present a novel hash technique which divides the image into non-overlapped blocks and distributes histogram bins of the image block into larger containers based on the Partial Sum of pixel count of histogram bins. An intermediate hash is produced by computing the ratio of pixel count between two neighbouring containers. The intermediate image hash is obtained by concatenating intermediate hashes of image blocks. Finally, the intermediate image hash is normalized and randomly permuted with a secret key to produce a robust and secure hash. The results shows that, the proposed method performs better when compared to the existing methods against the Content Preserving manipulations. Besides, the proposed method is more sensitive to Content Changing manipulations as well as un-altered histogram image modifications. The performance results on image authentication indicate that, the proposed method has high discriminative capability and strong robustness.
Similar content being viewed by others
References
Ammar M. Hassan et al (2009) Semi fragile image authentication using robust image hashing with localization, in proc. of second int. Conf Mach Vis 133–137
Black PE (2005) Fisher-Yates shuffle, dictionary of algorithms and data structures. Natl Inst Stand Technol, retrieved 2007
Choi YS, Park JH (2012) Image hash generation method using hierarchical histogram. Int Multimedia Tools Appl 61(1):181–194
Goljan M et al (2001),Distortion-free data embedding for images, in proc. of the 4th Int. Workshop Inf Hiding 25–27, pp 27–41
Han S-H, Chu C-H (2010) Content-based image authentication: current status, issues and challenges. Int Inf Secur 9(1):19–32
Han-Ling Zhang et al (2009) Content based image hashing robust to geometric transformation, in proc. of second Int. Symp Electron Commer Secur 105–108
Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. J Multimedia Tools Appl 39(1):1–4
Leest A et al (2003) Reversible image watermarking, in proceedings of the ICIP03. 2:731–734
Lei Y et al (2011) Robust image hash in radon transform domain for authentication. J Signal Process Image Commun 26(6):280–288
Wang L et al (2011) Image authentication based on perceptual hash using Gabor filters. J Soft Comput 15(3):493–504
Liu G et al (2011) A passive image authentication scheme for detecting region duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565
Matsuo T, Kaou K (2004) On parallel hash functions based on block ciphers. Proc IEICE Trans Fundam Electron Commun Comput Sci E87A(1):76–74
Nighat J, Arshad A (2010) A unified approach to secure and robust hashing scheme for image and video authentication, in proc. of 3rd Int. Congr Image and Sig Process 274–278
Qi X, Qi J (2007) A robust content based digital image watermarking scheme. J Signal Process 87:1264–1280
Saad SM (2009) Design of a robust and secure digital signature scheme for image authentication over wireless channels. IET Inf Security 3(1):1–8
Xiang S et al. (2007), Histogram based image hashing scheme robust against geometric deformations, in proc. of 9 Int. Work Multimedia and Secur 121–128
Skala V, Kucha M (2001) The hash function and the principle of duality. Proc Int Conf Comput Graph Int 200:167–174
Sun R, Zeng W (2012) Secure and robust image hashing via compressive sensing, in Int. J Multimedia Tools Appl 1–15
Swaminathan A, Mao Y, Min W (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 2(1):215–230
Weng L, Preneel B (2011) A secure perceptual hash algorithm for image content authentication. Commun Multimedia Secur LNCS 7025:108–121
Xiang S, Kim HJ (2011) Histogram based image hashing for searching content-preserving copies. Trans Data Hiding Multimedia Secur VI LNCS 6730:83–108
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vadlamudi, L.N., Vaddella, R.P.V. & Devara, V. Robust hash generation technique for content-based image authentication using histogram. Multimed Tools Appl 75, 6585–6604 (2016). https://doi.org/10.1007/s11042-015-2591-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2591-8