Skip to main content
Log in

Robust hashing for image authentication using SIFT feature and quaternion Zernike moments

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A novel robust image hashing scheme based on quaternion Zernike moments (QZMs) and the scale invariant feature transform (SIFT) is proposed for image authentication. The proposed method can locate tampered region and detect the nature of the modification, including object insertion, removal, replacement, copy-move and cut-to-paste operations. QZMs considered as global features are used for image authentication while SIFT key-point features provide image forgery localization and classification. Proposed approach performance were evaluated on the color images database of UCID and compared with several recent and efficient methods. These experiments show that the proposed scheme provides a short hash length that is robust to most common image content-preserving manipulations like large angle rotations, and allows us to correctly locating forged image regions as well as detecting types of forgery image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Battiato S, Farinella GM, Messina E, Puglisi G (2012) Robust image alignment for tampering detection. IEEE Trans Inf Forensics Secur 7(4):1105–1117

    Article  Google Scholar 

  2. Chen B, Shu H, Zhang H, Chen G, Luo L (2010) Color image analysis by quaternion Zernike moments. IEEE Int. Conf. Pattern Recognition, pp 625–628

  3. Chen B, Shu H, Zhang H, Chen G, Luo L (2012) Quaternion Zernike moments and their invariants for color image analysis and object recognition. Signal Process 92(2):308–318

    Article  Google Scholar 

  4. Fawcett T (2006) An introduction to ROC analysis. Pattern Recogn Lett 27(8):861–874

    Article  MathSciNet  Google Scholar 

  5. Fridrich J, Goljan M (2000) Robust hash functions for digital watermarking. Proc. Information Technology: Coding and Computing, pp 178–183

  6. Hamilton WR (1866) Elements of quaternions. Longmans Green, London

    Google Scholar 

  7. Kozat SS, Venkatesan R, Mihçak MK (2004) Robust perceptual image hashing via matrix invariants. Proc IEEE Int. Conf. Image Process, pp 3443–3446

  8. Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60:91–110

    Article  Google Scholar 

  9. Lu W, Wu M (2010) Multimedia forensic hash based on visual words. Proc. IEEE Int. Conf. Image Process, pp 989–992

  10. Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7(3):1081–1093

    Article  Google Scholar 

  11. Monga V, Mhcak M (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans Inf Forensics Secur 1(1):376–390

    Article  Google Scholar 

  12. Ouyang JL, Coatrieux G, Shu HZ (2015) Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform. Digital Signal Process 41(1):98–109

    Article  Google Scholar 

  13. Qin C, Chang CC, Tsou P-L (2012) Robust image hashing using non-uniform sampling in discrete Fourier domain. Digital Signal Process 23(2):578–585

    Article  MathSciNet  Google Scholar 

  14. Roover C, Vleeschouwer C, Lefèbvre F, Macq B (2005) Robust video hashing based on radial projections of key frames. IEEE Trans Signal Process 53(10):4020–4037

    Article  MathSciNet  MATH  Google Scholar 

  15. Roy S, Sun Q (2007) Robust hash for detecting and localizing image tampering. IEEE Int. Conf. Image Processing, pp 117–120

  16. Sangwine SJ (1966) Fourier transforms of colour images using quaternion or hypercomplex numbers. Electron Lett 32(21):1979–1980

    Article  Google Scholar 

  17. Schaefer G, Stich M (2004) UCID: an uncompressed color image database. Electronic Imaging, pp 472–480

  18. Tang Z, Dai Y, Zhang X (2012) Perceptual hashing for color images using invariant moments. Appl Math 6(2):643–650

    Google Scholar 

  19. Tang Z, Zhang X, Zhang S (2013) Robust perceptual image hashing based on ring partition and NMF. IEEE Trans Knowl Data Eng 1(1):376–390

    Google Scholar 

  20. USC-SIPI Image database. http://sipi.usc.edu/database/, Accessed 26 June 2015

  21. Wang XF, Xue JR, Zheng ZQ, Liu ZL, Li N (2012) Image forensic signature for content authenticity analysis. J Vis Commun Image Represent 23:782–797

    Article  Google Scholar 

  22. Xiang S, Kim H-J, Huang J (2007) Histogram-based image hashing scheme robust against geometric deformations. Proc. ACM Multimedia & Security Workshop, pp. 121–128

  23. Yong SC, Jong HP (2012) Image hash generation method using hierarchical histogram. Multimed Tools Appl 61:181–194

    Article  Google Scholar 

  24. Zhao Y, Wang ZX, Yao H (2013) Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Secur 8(1):55–63

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grants 61271312, the Research Fund for the Hunan Provincial Natural Science Foundation of china under Grant 2015JJ2056, and the Hunan Provincial University Innovation Platform Open Fund Project of China Grant 14K037.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junlin Ouyang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ouyang, J., Liu, Y. & Shu, H. Robust hashing for image authentication using SIFT feature and quaternion Zernike moments. Multimed Tools Appl 76, 2609–2626 (2017). https://doi.org/10.1007/s11042-015-3225-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3225-x

Keywords

Navigation