Table of Contents Author Guidelines Submit a Manuscript
Advances in Multimedia
Volume 2018, Article ID 4235268, 11 pages
https://doi.org/10.1155/2018/4235268
Research Article

Image Hashing for Tamper Detection with Multiview Embedding and Perceptual Saliency

School of Computer Science and Software Engineering, Tianjin Key Laboratory of Optoelectronic Detection Technology and System, Tianjin Polytechnic University, Tianjin 300387, China

Correspondence should be addressed to Ling Du; nc.ude.upjt@gnilud

Received 29 March 2018; Accepted 3 October 2018; Published 19 November 2018

Academic Editor: Kjell Brunnström

Copyright © 2018 Ling Du et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Venkatesan, S.-M. Koon, M. H. Jakubowski, and P. Moulin, “Robust image hashing,” in Proceedings of the International Conference on Image Processing (ICIP '00), pp. 664–666, September 2000. View at Scopus
  2. F. Lefebvre, J. Czyz, and B. Macq, “A robust soft hash algorithm for digital image signature,” in Proceedings of the International Conference on Image Processing, pp. 495–498, Barcelona, Spain. View at Publisher · View at Google Scholar
  3. A. Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 215–230, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. C. Kim, “Content-based image copy detection,” Signal Processing: Image Communication, vol. 18, no. 3, pp. 169–184, 2003. View at Publisher · View at Google Scholar · View at Scopus
  5. C.-P. Yan, C.-M. Pun, and X.-C. Yuan, “Quaternion-Based Image Hashing for Adaptive Tampering Localization,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2664–2677, 2016. View at Publisher · View at Google Scholar · View at Scopus
  6. X. Lv and Z. Jane Wang, “Perceptual image hashing based on shape contexts and local feature points,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1081–1093, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. V. Monga and B. L. Evans, “Perceptual image hashing via feature points: Performance evaluation and tradeoffs,” IEEE Transactions on Image Processing, vol. 15, no. 11, pp. 3452–3465, 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. S. S. Kozat, R. Venkatesan, and M. K. Mihçak, “Robust perceptual image hashing via matrix invariants,” in Proceedings of the International Conference on Image Processing, ICIP '04, pp. 3443–3446, Singapore, October 2004. View at Scopus
  9. V. Monga and M. K. Mihçak, “Robust and secure image hashing via non-negative matrix factorizations,” IEEE Transactions on Information Forensics & Security, vol. 2, no. 3, pp. 376–390, 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. X. Lv and Z. J. Wang, “An extended image hashing concept: Content-based fingerprinting using FJLT,” EURASIP Journal on Information Security, vol. 2009, pp. 1–17, 2009. View at Google Scholar · View at Scopus
  11. Z. Tang, X. Zhang, X. Li, and S. Zhang, “Robust image hashing with ring partition and invariant vector distance,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 1, pp. 200–214, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Wang, K. Pang, X. Zhou, Y. Zhou, L. Li, and J. Xue, “A visual model-based perceptual image hash for content authentication,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 7, pp. 1336–1349, 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. C.-P. Yan, C.-M. Pun, and X.-C. Yuan, “Multi-scale image hashing using adaptive local feature extraction for robust tampering detection,” Signal Processing, vol. 121, pp. 1–16, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. X. Lv and Z. J. Wang, “Compressed binary image hashes based on semisupervised spectral embedding,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 11, pp. 1838–1849, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Chen, X. Kang, Y. Liu, and Z. J. Wang, “Median Filtering Forensics Based on Convolutional Neural Networks,” IEEE Signal Processing Letters, vol. 22, no. 11, pp. 1849–1853, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Qian, J. Dong, W. Wang, and T. Tan, “Deep learning for steganalysis via convolutional neural networks,” in Media Watermarking, Security, and Forensics, 2015. View at Publisher · View at Google Scholar
  17. B. Bayar and M. C. Stamm, “A deep learning approach to universal image manipulation detection using a new convolutional layer,” in Proceedings of the 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec '16, pp. 5–10, Spain, June 2016. View at Scopus
  18. L. Bondi, S. Lameri, D. Guera, P. Bestagini, E. J. Delp, and S. Tubaro, “Tampering Detection and Localization Through Clustering of Camera-Based CNN Features,” in Proceedings of the 30th IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPRW '17, pp. 1855–1864, USA, July 2017. View at Scopus
  19. S. K. Yarlagadda, D. Güera, P. Bestagini, F. Maggie Zhu, S. Tubaro, and E. J. Delp, “Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier,” Journal of Electronic Imaging, vol. 2018, no. 7, pp. 214-1–214-9, 2018. View at Publisher · View at Google Scholar
  20. D. D'Avino, D. Cozzolino, G. Poggi, and L. Verdoliva, “Autoencoder with recurrent neural networks for video forgery detection,” in Proceedings of the Media Watermarking, Security, and Forensics 2017, MWSF 2017, pp. 92–99, USA, February 2017. View at Scopus
  21. A. Tuama, F. Comby, and M. Chaumont, “Camera model identification with the use of deep convolutional neural networks,” in Proceedings of the 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016, UAE, December 2016. View at Scopus
  22. L. Bondi, L. Baroffio, D. Guera, P. Bestagini, E. J. Delp, and S. Tubaro, “First Steps Toward Camera Model Identification with Convolutional Neural Networks,” IEEE Signal Processing Letters, vol. 24, no. 3, pp. 259–263, 2017. View at Publisher · View at Google Scholar · View at Scopus
  23. Y. Zhao, S. Wang, X. Zhang, and H. Yao, “Robust hashing for image authentication using zernike moments and local features,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 55–63, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. W. Burger and M. J. Burge, “Principles of digital image processing - core algorithms,” in Undergraduate Topics in Computer Science, Undergraduate Topics in Computer Science, pp. 1–24, Springer London, London, 2009. View at Publisher · View at Google Scholar
  25. R. C. González, R. E. Woods, and R. C. González, Digital image processing, 3rd edition, 2008.
  26. J. Wang, S. Kumar, and S.-F. Chang, “Semi-supervised hashing for large-scale search,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 12, pp. 2393–2406, 2012. View at Publisher · View at Google Scholar · View at Scopus
  27. H. Peng, B. Li, H. Ling, W. Hu, W. Xiong, and S. J. Maybank, “Salient object detection via structured matrix decomposition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39, no. 4, pp. 818–832, 2017. View at Publisher · View at Google Scholar
  28. P. Korus and J. Huang, “Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 809–824, 2017. View at Publisher · View at Google Scholar · View at Scopus
  29. P. Korus and J. Huang, “Evaluation of random field models in multi-modal unsupervised tampering localization,” in Proceedings of the 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016, pp. 1–6, UAE, December 2016. View at Scopus