• Home
  • About us
  • Your Publication
  • Catalogue
  • Newsletter
  • Help
  • Account
  • Contact / Imprint
Thesis - Publication series - Conference proceedings - Reference book - Lecture notes/Textbook - Journal - CD-/DVD-ROM - Online publication
Newsletter for authors and editors - New publications service - Archive
View basket
Catalogue : Details

Jinse Shin

Secure and Robust Image Hashing Algorithm for Content based Image Authentication

ISBN:978-3-8440-3986-3
Series:Forschungsberichte des Instituts für Digitale Kommunikationssysteme
Herausgeber: Prof. Dr. Christoph Ruland
Siegen
Volume:32
Keywords:Content based image authentication; image hashing; perceptual integrity; tamper detection and localization
Type of publication:Thesis
Language:English
Pages:148 pages
Figures:55 figures
Weight:219 g
Format:21 x 14,8 cm
Bindung:Paperback
Price:45,80 € / 57,25 SFr
Published:November 2015
Buy:
  » plus shipping costs
Recommendation:You want to recommend this title?
Review copy:Here you can order a review copy.
Link:You want to link this page? Click here.
Export citations:
Text
BibTex
RIS
Abstract:This paper proposes and evaluates a novel image hashing algorithm with simple and efficient tamper detection and localization capability for content based image authentication. In particular, the image-dependent key derivation stage using coarse image representation is introduced to enhance discriminability and security while the key-dependent histogram of oriented gradients (HOG) computation in conjunction with image intensity random transformation (IIRT) is proposed to construct a robust and secure hash. An extensive performance evaluation on both the classical benchmarking images and a real tamper image database is conducted. It is observed that the proposed method achieves excellent discriminability while still possessing good robustness against JPEG/JPEG 2000 compression and transmission errors. Furthermore, the experimental results and receiver operating characteristic (ROC) analysis demonstrate that the proposed method outperforms four representative image hashing schemes with respect to discriminability and security.