loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jinse Shin and Christoph Ruland

Affiliation: University of Siegen, Germany

ISBN: 978-989-758-045-1

ISSN: 2184-2825

Keyword(s): Content based Image Authentication, Perceptual Image Hashing, Tamper Detection.

Related Ontology Subjects/Areas/Topics: Data Engineering ; Data Integrity ; Databases and Data Security ; Digital Forensics ; Information and Systems Security

Abstract: Perceptual image hashing has received an increased attention as one of the most important components for content based image authentication in recent years. Content based image authentication using perceptual image hashing is mainly classified into four different categories according to the feature extraction scheme. However, all the recently published literature that belongs to the individual category has its own strengths and weaknesses related to the feature extraction scheme. In this regard, this paper proposes a hybrid approach to improve the performance by combining two different categories: low-level image representation and coarse image representation. The proposed method employs a well-known local feature descriptor, the so-called Histogram of Oriented Gradients (HOG), as the feature extraction scheme in conjunction with Image Intensity Random Transformation (IIRT), Successive Mean Quantization Transform (SMQT), and bit-level permutation to construct a secure and robust hash value. To enhance the proposed method, a Key Derivation Function (KDF) and Error Correction Code (ECC) are applied to generate a stable subkey based on the coarse image representation. The derived subkey is utilized as a random seed in IIRT and HOG feature computation. Additionally, the experimental results are presented and compared with two existing algorithms in terms of robustness, discriminability, and security. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.237.138.69

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Shin, J. and Ruland, C. (2014). A Hybrid Approach for Content Based Image Authentication.In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, ISSN 2184-2825, pages 371-378. DOI: 10.5220/0005059003710378

@conference{secrypt14,
author={Jinse Shin. and Christoph Ruland.},
title={A Hybrid Approach for Content Based Image Authentication},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={371-378},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005059003710378},
isbn={978-989-758-045-1},
}

TY - CONF

JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - A Hybrid Approach for Content Based Image Authentication
SN - 978-989-758-045-1
AU - Shin, J.
AU - Ruland, C.
PY - 2014
SP - 371
EP - 378
DO - 10.5220/0005059003710378

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.