Robust Hash for Detecting and Localizing Image Tampering
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations and distinct queries. Some applications also require the hash to be able to localize image tampering. This requires the hash to contain both robust content and alignment information to meet the abov...
Saved in:
Published in | 2007 IEEE International Conference on Image Processing Vol. 6; pp. VI - 117 - VI - 120 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English Japanese |
Published |
IEEE
01.09.2007
|
Subjects | |
Online Access | Get full text |
ISBN | 9781424414369 1424414369 |
ISSN | 1522-4880 |
DOI | 10.1109/ICIP.2007.4379535 |
Cover
Summary: | An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations and distinct queries. Some applications also require the hash to be able to localize image tampering. This requires the hash to contain both robust content and alignment information to meet the above criterion. Fulfilling this is difficult because of two contradictory requirements. First, the hash should be small and second, to verify authenticity and then localize tampering, the amount of information in the hash about the original required would be large. Hence a tradeoff between these requirements needs to be found. This paper presents an image hashing method that addresses this concern, to not only detect but also localize tampering using a small signature (< 1kB). Illustrative experiments bring out the efficacy of the proposed method compared to existing methods. |
---|---|
ISBN: | 9781424414369 1424414369 |
ISSN: | 1522-4880 |
DOI: | 10.1109/ICIP.2007.4379535 |