Cargando…
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and sensitive to malicious tampering. In this paper, a rob...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514477/ http://dx.doi.org/10.3390/e21111132 |
_version_ | 1783586596886413312 |
---|---|
author | Bashir, Iram Ahmed, Fawad Ahmad, Jawad Boulila, Wadii Alharbi, Nouf |
author_facet | Bashir, Iram Ahmed, Fawad Ahmad, Jawad Boulila, Wadii Alharbi, Nouf |
author_sort | Bashir, Iram |
collection | PubMed |
description | Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and sensitive to malicious tampering. In this paper, a robust and secure image hashing technique using a Gaussian pyramid is proposed. A Gaussian pyramid decomposes an image into different resolution levels which can be utilized to obtain robust and compact hash features. These stable features have been utilized in the proposed work to construct a secure and robust image hash. The proposed scheme uses Laplacian of Gaussian (LOG) and disk filters to filter the low-resolution Gaussian decomposed image. The filtered images are then subtracted and their difference is used as a hash. To make the hash secure, a key is introduced before feature extraction, thus making the entire feature space random. The proposed hashing scheme has been evaluated through a number of experiments involving cases of non-malicious distortions and malicious tampering. Experimental results reveal that the proposed hashing scheme is robust against non-malicious distortions and is sensitive to detect minute malicious tampering. Moreover, False Positive Probability (FPP) and False Negative Probability (FNP) results demonstrate the effectiveness of the proposed scheme when compared to state-of-the-art image hashing algorithms proposed in the literature. |
format | Online Article Text |
id | pubmed-7514477 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-75144772020-11-09 A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids Bashir, Iram Ahmed, Fawad Ahmad, Jawad Boulila, Wadii Alharbi, Nouf Entropy (Basel) Article Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and sensitive to malicious tampering. In this paper, a robust and secure image hashing technique using a Gaussian pyramid is proposed. A Gaussian pyramid decomposes an image into different resolution levels which can be utilized to obtain robust and compact hash features. These stable features have been utilized in the proposed work to construct a secure and robust image hash. The proposed scheme uses Laplacian of Gaussian (LOG) and disk filters to filter the low-resolution Gaussian decomposed image. The filtered images are then subtracted and their difference is used as a hash. To make the hash secure, a key is introduced before feature extraction, thus making the entire feature space random. The proposed hashing scheme has been evaluated through a number of experiments involving cases of non-malicious distortions and malicious tampering. Experimental results reveal that the proposed hashing scheme is robust against non-malicious distortions and is sensitive to detect minute malicious tampering. Moreover, False Positive Probability (FPP) and False Negative Probability (FNP) results demonstrate the effectiveness of the proposed scheme when compared to state-of-the-art image hashing algorithms proposed in the literature. MDPI 2019-11-19 /pmc/articles/PMC7514477/ http://dx.doi.org/10.3390/e21111132 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Bashir, Iram Ahmed, Fawad Ahmad, Jawad Boulila, Wadii Alharbi, Nouf A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids |
title | A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids |
title_full | A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids |
title_fullStr | A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids |
title_full_unstemmed | A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids |
title_short | A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids |
title_sort | secure and robust image hashing scheme using gaussian pyramids |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514477/ http://dx.doi.org/10.3390/e21111132 |
work_keys_str_mv | AT bashiriram asecureandrobustimagehashingschemeusinggaussianpyramids AT ahmedfawad asecureandrobustimagehashingschemeusinggaussianpyramids AT ahmadjawad asecureandrobustimagehashingschemeusinggaussianpyramids AT boulilawadii asecureandrobustimagehashingschemeusinggaussianpyramids AT alharbinouf asecureandrobustimagehashingschemeusinggaussianpyramids AT bashiriram secureandrobustimagehashingschemeusinggaussianpyramids AT ahmedfawad secureandrobustimagehashingschemeusinggaussianpyramids AT ahmadjawad secureandrobustimagehashingschemeusinggaussianpyramids AT boulilawadii secureandrobustimagehashingschemeusinggaussianpyramids AT alharbinouf secureandrobustimagehashingschemeusinggaussianpyramids |