Image authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local B...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Shahrood University of Technology
2015-01-01
|
Series: | Journal of Artificial Intelligence and Data Mining |
Subjects: | |
Online Access: | http://jad.shahroodut.ac.ir/article_438_f52baa7b766bb4c5418b44d4d9f67a9b.pdf |
id |
doaj-cf1527d27e4945ee9db748ac8bf875a9 |
---|---|
record_format |
Article |
spelling |
doaj-cf1527d27e4945ee9db748ac8bf875a92020-11-24T21:01:22ZengShahrood University of TechnologyJournal of Artificial Intelligence and Data Mining2322-52112322-44442015-01-0131213010.5829/idosi.JAIDM.2015.03.01.03438Image authentication using LBP-based perceptual image hashingR. Davarzani0S. Mozaffari1Kh. Yaghmaie2Department of Electrical and Computer Engineering, College of Engineering, Shahrood Branch, Islamic Azad University, Shahrood, IranFaculty of Electrical and Computer Engineering, Semnan University, Semnan, Iran.Faculty of Electrical and Computer Engineering, Semnan University, Semnan, Iran.Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for perceptual image hashing. In feature extraction, we propose to use both sign and magnitude information of local differences. So, the algorithm utilizes a combination of gradient-based and LBP-based descriptors for feature extraction. To provide security needs, two secret keys are incorporated in feature extraction and hash generation steps. Performance of the proposed hashing method is evaluated with an important application in perceptual image hashing scheme: image authentication. Experiments are conducted to show that the present method has acceptable robustness against perceptual content-preserving manipulations. Moreover, the proposed method has this capability to localize the tampering area, which is not possible in all hashing schemes.http://jad.shahroodut.ac.ir/article_438_f52baa7b766bb4c5418b44d4d9f67a9b.pdfCenter-symmetric local binary patternsperceptual image hashingimage authenticationtamper detection |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
R. Davarzani S. Mozaffari Kh. Yaghmaie |
spellingShingle |
R. Davarzani S. Mozaffari Kh. Yaghmaie Image authentication using LBP-based perceptual image hashing Journal of Artificial Intelligence and Data Mining Center-symmetric local binary patterns perceptual image hashing image authentication tamper detection |
author_facet |
R. Davarzani S. Mozaffari Kh. Yaghmaie |
author_sort |
R. Davarzani |
title |
Image authentication using LBP-based perceptual image hashing |
title_short |
Image authentication using LBP-based perceptual image hashing |
title_full |
Image authentication using LBP-based perceptual image hashing |
title_fullStr |
Image authentication using LBP-based perceptual image hashing |
title_full_unstemmed |
Image authentication using LBP-based perceptual image hashing |
title_sort |
image authentication using lbp-based perceptual image hashing |
publisher |
Shahrood University of Technology |
series |
Journal of Artificial Intelligence and Data Mining |
issn |
2322-5211 2322-4444 |
publishDate |
2015-01-01 |
description |
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for perceptual image hashing. In feature extraction, we propose to use both sign and magnitude information of local differences. So, the algorithm utilizes a combination of gradient-based and LBP-based descriptors for feature extraction. To provide security needs, two secret keys are incorporated in feature extraction and hash generation steps. Performance of the proposed hashing method is evaluated with an important application in perceptual image hashing scheme: image authentication. Experiments are conducted to show that the present method has acceptable robustness against perceptual content-preserving manipulations. Moreover, the proposed method has this capability to localize the tampering area, which is not possible in all hashing schemes. |
topic |
Center-symmetric local binary patterns perceptual image hashing image authentication tamper detection |
url |
http://jad.shahroodut.ac.ir/article_438_f52baa7b766bb4c5418b44d4d9f67a9b.pdf |
work_keys_str_mv |
AT rdavarzani imageauthenticationusinglbpbasedperceptualimagehashing AT smozaffari imageauthenticationusinglbpbasedperceptualimagehashing AT khyaghmaie imageauthenticationusinglbpbasedperceptualimagehashing |
_version_ |
1716778208651640832 |