Robust Hash for Detecting and Localizing Image Tampering

An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations and distinct queries. Some applications also require the hash to be able to localize image tampering. This requires the hash to contain both robust content and alignment information to meet the abov...

Full description

Saved in:
Bibliographic Details
Published in2007 IEEE International Conference on Image Processing Vol. 6; pp. VI - 117 - VI - 120
Main Authors Sujoy Roy, Qibin Sun
Format Conference Proceeding
LanguageEnglish
Japanese
Published IEEE 01.09.2007
Subjects
Online AccessGet full text
ISBN9781424414369
1424414369
ISSN1522-4880
DOI10.1109/ICIP.2007.4379535

Cover

More Information
Summary:An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations and distinct queries. Some applications also require the hash to be able to localize image tampering. This requires the hash to contain both robust content and alignment information to meet the above criterion. Fulfilling this is difficult because of two contradictory requirements. First, the hash should be small and second, to verify authenticity and then localize tampering, the amount of information in the hash about the original required would be large. Hence a tradeoff between these requirements needs to be found. This paper presents an image hashing method that addresses this concern, to not only detect but also localize tampering using a small signature (< 1kB). Illustrative experiments bring out the efficacy of the proposed method compared to existing methods.
ISBN:9781424414369
1424414369
ISSN:1522-4880
DOI:10.1109/ICIP.2007.4379535