Cargando…

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids

Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and sensitive to malicious tampering. In this paper, a rob...

Descripción completa

Detalles Bibliográficos
Autores principales: Bashir, Iram, Ahmed, Fawad, Ahmad, Jawad, Boulila, Wadii, Alharbi, Nouf
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514477/
http://dx.doi.org/10.3390/e21111132
_version_ 1783586596886413312
author Bashir, Iram
Ahmed, Fawad
Ahmad, Jawad
Boulila, Wadii
Alharbi, Nouf
author_facet Bashir, Iram
Ahmed, Fawad
Ahmad, Jawad
Boulila, Wadii
Alharbi, Nouf
author_sort Bashir, Iram
collection PubMed
description Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and sensitive to malicious tampering. In this paper, a robust and secure image hashing technique using a Gaussian pyramid is proposed. A Gaussian pyramid decomposes an image into different resolution levels which can be utilized to obtain robust and compact hash features. These stable features have been utilized in the proposed work to construct a secure and robust image hash. The proposed scheme uses Laplacian of Gaussian (LOG) and disk filters to filter the low-resolution Gaussian decomposed image. The filtered images are then subtracted and their difference is used as a hash. To make the hash secure, a key is introduced before feature extraction, thus making the entire feature space random. The proposed hashing scheme has been evaluated through a number of experiments involving cases of non-malicious distortions and malicious tampering. Experimental results reveal that the proposed hashing scheme is robust against non-malicious distortions and is sensitive to detect minute malicious tampering. Moreover, False Positive Probability (FPP) and False Negative Probability (FNP) results demonstrate the effectiveness of the proposed scheme when compared to state-of-the-art image hashing algorithms proposed in the literature.
format Online
Article
Text
id pubmed-7514477
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75144772020-11-09 A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids Bashir, Iram Ahmed, Fawad Ahmad, Jawad Boulila, Wadii Alharbi, Nouf Entropy (Basel) Article Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and sensitive to malicious tampering. In this paper, a robust and secure image hashing technique using a Gaussian pyramid is proposed. A Gaussian pyramid decomposes an image into different resolution levels which can be utilized to obtain robust and compact hash features. These stable features have been utilized in the proposed work to construct a secure and robust image hash. The proposed scheme uses Laplacian of Gaussian (LOG) and disk filters to filter the low-resolution Gaussian decomposed image. The filtered images are then subtracted and their difference is used as a hash. To make the hash secure, a key is introduced before feature extraction, thus making the entire feature space random. The proposed hashing scheme has been evaluated through a number of experiments involving cases of non-malicious distortions and malicious tampering. Experimental results reveal that the proposed hashing scheme is robust against non-malicious distortions and is sensitive to detect minute malicious tampering. Moreover, False Positive Probability (FPP) and False Negative Probability (FNP) results demonstrate the effectiveness of the proposed scheme when compared to state-of-the-art image hashing algorithms proposed in the literature. MDPI 2019-11-19 /pmc/articles/PMC7514477/ http://dx.doi.org/10.3390/e21111132 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Bashir, Iram
Ahmed, Fawad
Ahmad, Jawad
Boulila, Wadii
Alharbi, Nouf
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
title A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
title_full A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
title_fullStr A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
title_full_unstemmed A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
title_short A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
title_sort secure and robust image hashing scheme using gaussian pyramids
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514477/
http://dx.doi.org/10.3390/e21111132
work_keys_str_mv AT bashiriram asecureandrobustimagehashingschemeusinggaussianpyramids
AT ahmedfawad asecureandrobustimagehashingschemeusinggaussianpyramids
AT ahmadjawad asecureandrobustimagehashingschemeusinggaussianpyramids
AT boulilawadii asecureandrobustimagehashingschemeusinggaussianpyramids
AT alharbinouf asecureandrobustimagehashingschemeusinggaussianpyramids
AT bashiriram secureandrobustimagehashingschemeusinggaussianpyramids
AT ahmedfawad secureandrobustimagehashingschemeusinggaussianpyramids
AT ahmadjawad secureandrobustimagehashingschemeusinggaussianpyramids
AT boulilawadii secureandrobustimagehashingschemeusinggaussianpyramids
AT alharbinouf secureandrobustimagehashingschemeusinggaussianpyramids