Downloads: 111
Case Studies | Electronics & Communication Engineering | India | Volume 3 Issue 6, June 2014
A Novel Approach for Image Authentication by Robust Hashing Using Zernike Moments and Local Features
Arunkumar Geddalamari | D Basavalingappa
Abstract: Image hashing maps an image to a short binary sequence representing the image characters. This paper proposes a new image hashing method using Zernike moments that are an effective means for extracting robust features from an image. The method is based on rotation invariance of magnitudes and correct phases of Zernike moments and detecting image forgery including removal; insertion; and replacement of objects; and abnormal color modification; and for locating the forged area. We use Zernike moments of the luminance/chrominance components to reflect the images global characteristics; and extract local texture features from salient regions in the image to represent contents in the corresponding areas. Distance metrics indicating the degree of similarity between two hashes and defined to measure the hash performance. Two thresholds are used to decide whether a given image is an original/normal-processed or maliciously doctored version of a reference image; or is simply a different image. The method can be used to replacement of objects or abnormal modification of colors. Probability of collision between hashes of different images approaches zero. Experimental results are presented to show effectiveness of the method.
Keywords: Forgery detection, image hash, perceptual robustness, saliency, Zernike moments
Edition: Volume 3 Issue 6, June 2014,
Pages: 1104 - 1106
Similar Articles with Keyword 'Forgery detection'
Downloads: 99
Review Papers, Electronics & Communication Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2212 - 2217A Review on Digital Image Forgeries
Hemin Jose | Lekshmy S [2]
Downloads: 129
Survey Paper, Electronics & Communication Engineering, India, Volume 4 Issue 3, March 2015
Pages: 876 - 878A Survey on Copy Move Image Forgery Detection Using Wavelet Transform
Akanksha Namdeo [2] | Anish Vishwakarma [4]