1. A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
- Author
-
Wadii Boulila, Nouf Alharbi, Fawad Ahmed, Jawad Ahmad, Iram Bashir, Laboratoire de recherche en Génie Logiciel, Applications distribuées, Systèmes décisionnels et Imagerie intelligente [Manouba] (RIADI), École Nationale des Sciences de l'Informatique [Manouba] (ENSI), and Université de la Manouba [Tunisie] (UMA)-Université de la Manouba [Tunisie] (UMA)
- Subjects
Computer science ,Feature vector ,Gaussian ,Feature extraction ,Hash function ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,General Physics and Astronomy ,lcsh:Astrophysics ,02 engineering and technology ,security ,Blob detection ,Article ,symbols.namesake ,Digital image ,digital image ,False Negative Probability (FNP) ,hash ,lcsh:QB460-466 ,0202 electrical engineering, electronic engineering, information engineering ,Cryptographic hash function ,Data_FILES ,[INFO]Computer Science [cs] ,lcsh:Science ,ComputingMilieux_MISCELLANEOUS ,Computer Science::Databases ,Computer Science::Cryptography and Security ,False Positive Probability (FPP) ,020207 software engineering ,Filter (signal processing) ,distortions ,lcsh:QC1-999 ,[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV] ,Computer Science::Computer Vision and Pattern Recognition ,symbols ,020201 artificial intelligence & image processing ,lcsh:Q ,Algorithm ,lcsh:Physics - Abstract
Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and sensitive to malicious tampering. In this paper, a robust and secure image hashing technique using a Gaussian pyramid is proposed. A Gaussian pyramid decomposes an image into different resolution levels which can be utilized to obtain robust and compact hash features. These stable features have been utilized in the proposed work to construct a secure and robust image hash. The proposed scheme uses Laplacian of Gaussian (LOG) and disk filters to filter the low-resolution Gaussian decomposed image. The filtered images are then subtracted and their difference is used as a hash. To make the hash secure, a key is introduced before feature extraction, thus making the entire feature space random. The proposed hashing scheme has been evaluated through a number of experiments involving cases of non-malicious distortions and malicious tampering. Experimental results reveal that the proposed hashing scheme is robust against non-malicious distortions and is sensitive to detect minute malicious tampering. Moreover, False Positive Probability (FPP) and False Negative Probability (FNP) results demonstrate the effectiveness of the proposed scheme when compared to state-of-the-art image hashing algorithms proposed in the literature.
- Published
- 2019
- Full Text
- View/download PDF