We propose a novel image authentication system by combining perceptual hashing and robust watermarking. An image is divided into blocks. Each block is represented by a compact hash value. The hash value is embedded in the block. The authenticity of the image can be verified by re-computing hash values and comparing them with the ones extracted from the image. The system can tolerate a wide range of incidental distortion, and locate tampered areas as small as 1/64 of an image. In order to have minimal interference, we design both the hash and the watermark algorithms in the wavelet domain. The hash is formed by the sign bits of wavelet coefficients. The lattice-based QIM watermarking algorithm ensures a high payload while maintaining the image quality. Extensive experiments confirm the good performance of the proposal, and show that our proposal significantly outperforms a state-of-the-art algorithm.
Weng, L, Braeckman, G, Dooms, A & Preneel, B 2012, Robust Image Content Authentication with Tamper Location. in IEEE International Conference on Multimedia and Expo (ICME 2012). IEEE, pp. 380-385, 2012 IEEE International Conference on Multimedia and Expo, Melbourne, VIC, Australia, 9/07/12.
Weng, L., Braeckman, G., Dooms, A., & Preneel, B. (2012). Robust Image Content Authentication with Tamper Location. In IEEE International Conference on Multimedia and Expo (ICME 2012) (pp. 380-385). IEEE.
@inproceedings{add445b952ce4dd89b54b36535d24ec3,
title = "Robust Image Content Authentication with Tamper Location",
abstract = "We propose a novel image authentication system by combining perceptual hashing and robust watermarking. An image is divided into blocks. Each block is represented by a compact hash value. The hash value is embedded in the block. The authenticity of the image can be verified by re-computing hash values and comparing them with the ones extracted from the image. The system can tolerate a wide range of incidental distortion, and locate tampered areas as small as 1/64 of an image. In order to have minimal interference, we design both the hash and the watermark algorithms in the wavelet domain. The hash is formed by the sign bits of wavelet coefficients. The lattice-based QIM watermarking algorithm ensures a high payload while maintaining the image quality. Extensive experiments confirm the good performance of the proposal, and show that our proposal significantly outperforms a state-of-the-art algorithm.",
keywords = "watermarking, perceptual hashing",
author = "Li Weng and Geert Braeckman and Ann Dooms and Bart Preneel",
year = "2012",
month = jul,
day = "6",
language = "English",
isbn = "978-1-4673-1659-0",
pages = "380--385",
booktitle = "IEEE International Conference on Multimedia and Expo (ICME 2012)",
publisher = "IEEE",
note = "2012 IEEE International Conference on Multimedia and Expo ; Conference date: 09-07-2012 Through 13-07-2012",
}