Abstract
A novel robust image hashing scheme based on quaternion Zernike moments (QZMs) and the scale invariant feature transform (SIFT) is proposed for image authentication. The proposed method can locate tampered region and detect the nature of the modification, including object insertion, removal, replacement, copy-move and cut-to-paste operations. QZMs considered as global features are used for image authentication while SIFT key-point features provide image forgery localization and classification. Proposed approach performance were evaluated on the color images database of UCID and compared with several recent and efficient methods. These experiments show that the proposed scheme provides a short hash length that is robust to most common image content-preserving manipulations like large angle rotations, and allows us to correctly locating forged image regions as well as detecting types of forgery image.
Similar content being viewed by others
References
Battiato S, Farinella GM, Messina E, Puglisi G (2012) Robust image alignment for tampering detection. IEEE Trans Inf Forensics Secur 7(4):1105–1117
Chen B, Shu H, Zhang H, Chen G, Luo L (2010) Color image analysis by quaternion Zernike moments. IEEE Int. Conf. Pattern Recognition, pp 625–628
Chen B, Shu H, Zhang H, Chen G, Luo L (2012) Quaternion Zernike moments and their invariants for color image analysis and object recognition. Signal Process 92(2):308–318
Fawcett T (2006) An introduction to ROC analysis. Pattern Recogn Lett 27(8):861–874
Fridrich J, Goljan M (2000) Robust hash functions for digital watermarking. Proc. Information Technology: Coding and Computing, pp 178–183
Hamilton WR (1866) Elements of quaternions. Longmans Green, London
Kozat SS, Venkatesan R, Mihçak MK (2004) Robust perceptual image hashing via matrix invariants. Proc IEEE Int. Conf. Image Process, pp 3443–3446
Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60:91–110
Lu W, Wu M (2010) Multimedia forensic hash based on visual words. Proc. IEEE Int. Conf. Image Process, pp 989–992
Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7(3):1081–1093
Monga V, Mhcak M (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans Inf Forensics Secur 1(1):376–390
Ouyang JL, Coatrieux G, Shu HZ (2015) Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform. Digital Signal Process 41(1):98–109
Qin C, Chang CC, Tsou P-L (2012) Robust image hashing using non-uniform sampling in discrete Fourier domain. Digital Signal Process 23(2):578–585
Roover C, Vleeschouwer C, Lefèbvre F, Macq B (2005) Robust video hashing based on radial projections of key frames. IEEE Trans Signal Process 53(10):4020–4037
Roy S, Sun Q (2007) Robust hash for detecting and localizing image tampering. IEEE Int. Conf. Image Processing, pp 117–120
Sangwine SJ (1966) Fourier transforms of colour images using quaternion or hypercomplex numbers. Electron Lett 32(21):1979–1980
Schaefer G, Stich M (2004) UCID: an uncompressed color image database. Electronic Imaging, pp 472–480
Tang Z, Dai Y, Zhang X (2012) Perceptual hashing for color images using invariant moments. Appl Math 6(2):643–650
Tang Z, Zhang X, Zhang S (2013) Robust perceptual image hashing based on ring partition and NMF. IEEE Trans Knowl Data Eng 1(1):376–390
USC-SIPI Image database. http://sipi.usc.edu/database/, Accessed 26 June 2015
Wang XF, Xue JR, Zheng ZQ, Liu ZL, Li N (2012) Image forensic signature for content authenticity analysis. J Vis Commun Image Represent 23:782–797
Xiang S, Kim H-J, Huang J (2007) Histogram-based image hashing scheme robust against geometric deformations. Proc. ACM Multimedia & Security Workshop, pp. 121–128
Yong SC, Jong HP (2012) Image hash generation method using hierarchical histogram. Multimed Tools Appl 61:181–194
Zhao Y, Wang ZX, Yao H (2013) Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Secur 8(1):55–63
Acknowledgments
This work was supported by the National Natural Science Foundation of China under Grants 61271312, the Research Fund for the Hunan Provincial Natural Science Foundation of china under Grant 2015JJ2056, and the Hunan Provincial University Innovation Platform Open Fund Project of China Grant 14K037.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ouyang, J., Liu, Y. & Shu, H. Robust hashing for image authentication using SIFT feature and quaternion Zernike moments. Multimed Tools Appl 76, 2609–2626 (2017). https://doi.org/10.1007/s11042-015-3225-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-3225-x