SlideShare a Scribd company logo
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
192
Enhanced Hashing Approach For
Image Forgery Detection With
Feature Level Fusion
G. Mathumitha
PG Scholar, Department of CSE,
Paavai College of Engineering,
Namakkal, India.
R. Murugesan
Assistant Professor, Department of CSE,
Paavai College of Engineering,
Namakkal, India.
Abstract—Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims
at finding the originality of an image. Due to the advent of many image editing software image tampering has become common.
The Enhanced hashing approach is suggested for image authentication. The concept of Hashing has been used for searching
images from large databases. It can also be applied to image authentication as it produces different results with respect to the
change in image. But the hashing methods used for similarity searches cannot be used for image authentication since they are no
sensitive for small changes. Moreover, we need a system that detects only perceptual changes. A new hashing method, namely,
enhanced robust hashing is proposed for image authentication, which uses global and local properties of an image. This method is
developed for detecting image forgery, including removal, insertion, and replacement of objects, and abnormal color
modification, and for locating the forged area. The local models include position and texture information of object regions in the
image. The hash mechanism uses secret keys for encryption and decryption. IP tracing is done to track the suspicious nodes.
Index Terms—Image forgery, image hashing, global and local properties, perceptual hashing, image authentication
——————————  ——————————
1 INTRODUCTION
Digital images are increasingly transmitted over non-secure
channels such as the Internet. Therefore, military, medical and
quality control images must be protected against security attacks.
Hence, image authentication has become a mandatory process in
image sharing. An image hash function maps an image to a short
binary string based on the image's appearance to the human eye.
With advancement in technology, there are many multimedia data
available over the internet. As storage becomes less costly, all the
data are stored in database as blob objects.
One primitive way for dealing with massive multimedia
databases is the similarity search problem. It aims to retrieve
similar objects to the query object from the database. Particularly,
similarity search is at the heart of many multimedia applications,
such as image retrieval, video recommendation, event detection,
and face recognition. To improve the performance of similarity
search, a long stream of research efforts has been made in the
database community.
Because of the difference in dimensionality it is difficult to
find the exact image using similarity search. To address this issue
approximate similarity search has been implemented in recent
years, which brings related images as a result instead of exact
images for the given query. With the advent of many image
editing software and its widespread use, image authentication
becomes important to avoid image forgery. Hashing can be
efficiently used to authenticate an image since a small change in
the image will produce a different hash code when the same hash
function is used.
In general, a hash should be short, robust against simple
image modifications and sensitive against major modifications.
Therefore the objective is to provide a reasonably short hash code
for an image with good performance. Global moments of the
luminance and chrominance components are used to reflect the
image’s global characteristics, and extract local texture features
from salient regions in the image to represent the contents in the
corresponding areas.
2 PROPOSED IMAGE AUTHENTICATION PROTOCOL
Many previous schemes are either based on global or local
features. Global features are generally short but insensitive to
changes of small areas in the image, while local features can
reflect regional modifications but usually produce longer hashes.
Therefore, a method that generates reasonably short hash code
and better reflects the properties of an image is required. The
proposed work focuses on efficient and automatic techniques to
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
193
identify and verify the contents of digital images. The services
provided by the proposed image authentication system are
mentioned below.
1. Identify the received image as a similar image, or a
tampered image, or a different image.
2. Evaluate similarity of two images by calculating the
distance between them.
3. Identify and locate three types of tampered area: Added
area, Removed area, Changed area.
4. Estimate the percentage of tampered area.
Fig. 1. Process steps for image authentication.
When an image is sent to the user, a possible solution to prove
authenticity is to generate a hash value and send it securely to the
user. The hash value is a compact string. It can be called as an
abstract of the content. A user can regenerate hash value from the
received image, and compare it with the original hash value. If
they match, the content is considered as authentic. In order to
allow incidental distortion, the hash value must possess some
robustness.
In [1], the authors generated image hash using Zernike
Moments and local features. But the Salient region is detected as
rectangular boxes which include some background details and
does not clearly show the salient region. In order identify the
salient region edge detection mechanism is used in the proposed
work. And also IP tracing is enabled in the proposed system to
find the malicious node where the image got tampered. Fig.3
explains the process steps of the proposed image authentication
protocol.
The image is first rescaled to a fixed size and converted from
RGB to grayscale. These steps are covered under the
preprocessing step. The aim of rescaling is to ensure that the
generated image hash has a fixed length and the same
computation complexity. Next global and local features are
extracted. Then the Global and local features are concatenated to
construct a final hash value.
2.1 Edge Detection Mechanisms
Our proposed work includes research on the embedding
algorithm robust to geometric distortions and improving the
precision in locating the altered areas by implementing via any
digital multimedia networking application for verifying the
content of image transmission over RGB features.
So this kind of implementation is desired to find features that
best represent the image contents so as to enhance the hash’s
sensitivity to small area tampering while maintaining short hash
length, good robustness against normal image processing like
edge detection mechanisms and include tracer routing to detect
the content modified hacker system which is use full to reduce the
hacking possibilities. So without knowledge of this method,
hacker information may be acknowledged to the sender once the
hacker receives the packet for content or object modifications.
Fig. 2. Salient feature identification using Edge detection.
Here, in the final image salient features are highlighted.
Instead of rectangular boxes only the edges were traced thus
giving only the salient feature. Hash can be constructed for the
detected regions and transmitted along with the original image to
the receiver.
2.2 Hashing Generation and Encryption
The global and object local vectors are concatenated to form
an intermediate hash, which is then pseudo-randomly scrambled
based on a secret key to produce the final hash sequence.
Advanced encryption algorithms are used to encrypt the hash
sequence with respect to secret keys.
Received
Image
Preprocessing
Edge detection
Hash
construction
Fake image Original Image
IP tracing
End Process
Malicious Node Identified
Hash
Function
Match with
original
hash
YesNo
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
194
The user regenerates the hash value from the received image
after successfully decrypting it and compares it with the original
hash value. If they match, the content is considered as authentic.
Otherwise the received image is identified as a fake one.
2.3 Hamming Distance Matching
Distance between hashes of an image pair is used as a metric
for finding similarity or dissimilarity of the two images. The hash
sequence of a received image needs to be tested with the
decrypted hash sequence under similarity ratio. If the difference is
above the threshold then it has been maliciously tampered else it
is considered as legitimate image.
2.4 IP Tracing
Tracer routing is used to find out the unauthorized router or
the system that purposefully modified the content of the image
and forwarded it to the destination in a routing process. This can
be done by getting acknowledgment from every router in the
routing process by a source. Then source compares the
acknowledgement with the predefined routing table for any
routing delay or IP mismatch. Thus the attacker node can be
identified and reported.
3 DISCUSSION AND CONCLUSION
The proposed image hashing approach is developed using
both global and local features. Image hashes produced with the
proposed method are robust against common image processing
operations like brightness adjustment, rescaling and addition of
noise. The IP tracing mechanism helps to find the malicious node
thus providing a full fledged authentication mechanism.
REFERENCES
[1] Robust Hashing for Image Authentication Using Zernike
Moments and Local Features Yan Zhao, Shuozhong Wang,
Xinpeng Zhang, and Heng Yao, Member, IEEE.
[2] S. Xiang, H. J. Kim, and J. Huang, ―Histogram-based image
hashing scheme robust against geometric deformations,‖ in
Proc. ACM Multimedia and Security Workshop, New York,
2007, pp. 121–128.
[3] V. Monga, A. Banerjee, and B. L. Evans, ―A clustering
based approach to perceptual image hashing,‖ IEEE Trans.
Inf. Forensics Security, vol. 1, no. 1, pp. 68–79, Mar. 2006.
[4] Robust Hashing with Local Models for Approximate
Similarity Search Jingkuan Song, Yi Yang, Xuelong Li,
Fellow, IEEE, Zi Huang, and Yang Yang
[5] Bohm C., Berchtold S., and Keim D. A.(2001), ―Searching in
high-dimensional spaces: Index structures for improving the
performance of multimedia databases,‖ ACM Comput.
Survey, vol. 33, no. 3, pp. 322–373.
[6] Cappelli R. (2011), ―Fast and accurate fingerprint indexing
based on ridge orientation and frequency,‖ TSMCB, vol. 41,
no. 6, pp. 1511–1521.
[7] Datar M. and Indyk P. (2004), ―Locality-sensitive hashing
scheme based on p-stable distributions,‖ in Proc. SCG, pp.
253–262.
[8] Datta R., Joshi D., Li J., and Wang J. Z. (2008), ―Image
retrieval: Ideas, influences, and trends of the new age,‖ ACM
Comput. Survey, vol. 40.
[9] Gionis A., Indyk P., and Motwani R. (1999), ―Similarity
search in high dimensions via hashing,‖ in Proc. VLDB, pp.
518–529.
[10] Jagadish H. V., Ooi B. C., Tan K. L., Yu C., and Zhang R.
(2005), ―iDistance: An adaptive B+-tree based indexing
method for nearest neighbor search,‖ ACM TODS, vol. 30,
no. 2, pp. 364–397.
[11] Jingkuan Song, Yi Yang, Xuelong Li, Fellow, IEEE, Zi
Huang, and Yang Yang (2014) "Robust Hashing With Local
Models for Approximate Similarity search" IEEE
transactions on cybernetics, vol. 44, no. 7
[12] Lv Q., Josephson W., Wang Z., Charikar M. and Li
K.(2007), ―Multi-probe LSH: Efficient indexing for high-
dimensional similarity search,‖ in Proc. VLDB, pp. 950–961.
[13] Salakhutdinov R. and Hinton G. E. (2009), ―Semantic
hashing,‖ Int. J. Approx. Reasoning, vol. 50, no. 7, pp. 969–
978.
[14] Shen H. T., Ooi B. C. and Zhou X. (2005), ―Towards
effective indexing for very large video sequence database,‖
in Proc. SIGMOD, pp. 730–741.
[15] Tao Y., Yi K., Sheng C., and Kalnis P. (2010), ―Efficient and
accurate nearest neighbor and closest pair search in high-
dimensional space,‖ ACM TODS, vol. 35, no. 3.
[16] Weiss Y., Torralba A., and Fergus R. (2008), ―Spectral
hashing,‖ in Proc. NIPS, pp. 1753–1760.
[17] Yang Y., Xu D., Nie F., Luo J. and Zhuang Y. (2009),
―Ranking with local regression and global alignment for
cross media retrieval,‖ in Proc. ACM Multimedia, pp. 175–
184.
[18] Zhang D., Wang J., Cai D. and Lu J. (2010), ―Self-taught
hashing for fast similarity search,‖ in SIGIR, pp. 18–25.
[19] Zhang L., Wang L., and Lin W. (2012), ―Generalized biased
discriminant analysis for content-based image retrieval,‖
TSMCB, vol. 42, no. 1, pp. 282–290.

More Related Content

PDF
International Journal of Engineering Research and Development
PDF
Performance Evaluation of Password Authentication using Associative Neural Me...
PDF
IJAER Publishes
PDF
IRJET- Encryption and Authentication of Image by using Data Hiding
PDF
Pso based optimized security scheme for image authentication and tamper proofing
PDF
Significant Data Hiding through Discrete Wavelet Transformation Approach
PDF
IRJET- Capsearch - An Image Caption Generation Based Search
PDF
Adaptive block-based pixel value differencing steganography
International Journal of Engineering Research and Development
Performance Evaluation of Password Authentication using Associative Neural Me...
IJAER Publishes
IRJET- Encryption and Authentication of Image by using Data Hiding
Pso based optimized security scheme for image authentication and tamper proofing
Significant Data Hiding through Discrete Wavelet Transformation Approach
IRJET- Capsearch - An Image Caption Generation Based Search
Adaptive block-based pixel value differencing steganography

What's hot (6)

DOC
Revealing the trace of high quality jpeg
PDF
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
PDF
A Survey of different Data Hiding Techniques in Digital Images
PDF
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
PDF
Conditional entrench spatial domain steganography
PDF
N010226872
Revealing the trace of high quality jpeg
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Survey of different Data Hiding Techniques in Digital Images
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
Conditional entrench spatial domain steganography
N010226872
Ad

Similar to Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion (20)

PDF
A Review on Matching For Sketch Technique
PDF
Strong Image Alignment for Meddling Recognision Purpose
PDF
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
PDF
50120130405017 2
PDF
IRJET - An Enhanced Approach for Extraction of Text from an Image using Fuzzy...
PDF
Ko3419161921
PDF
Reversible Image Data Hiding with Contrast Enhancement
PDF
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
PDF
Ijarcet vol-2-issue-3-1078-1080
PDF
Dc31472476
PDF
G010245056
PDF
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
PDF
F017374752
PDF
Applications of spatial features in cbir a survey
PDF
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
PDF
Conference research paper_target_tracking
PDF
10.1.1.432.9149
PDF
10.1.1.432.9149.pdf
PDF
https://uii.io/0hIB
PDF
A deep locality-sensitive hashing approach for achieving optimal image retri...
A Review on Matching For Sketch Technique
Strong Image Alignment for Meddling Recognision Purpose
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
50120130405017 2
IRJET - An Enhanced Approach for Extraction of Text from an Image using Fuzzy...
Ko3419161921
Reversible Image Data Hiding with Contrast Enhancement
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
Ijarcet vol-2-issue-3-1078-1080
Dc31472476
G010245056
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
F017374752
Applications of spatial features in cbir a survey
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
Conference research paper_target_tracking
10.1.1.432.9149
10.1.1.432.9149.pdf
https://uii.io/0hIB
A deep locality-sensitive hashing approach for achieving optimal image retri...
Ad

More from IJTET Journal (20)

PDF
Beaglebone Black Webcam Server For Security
PDF
Biometrics Authentication Using Raspberry Pi
PDF
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
PDF
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
PDF
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
PDF
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
PDF
Raspberry Pi Based Client-Server Synchronization Using GPRS
PDF
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
PDF
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
PDF
Improved Trans-Z-source Inverter for Automobile Application
PDF
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
PDF
Comprehensive Path Quality Measurement in Wireless Sensor Networks
PDF
Optimizing Data Confidentiality using Integrated Multi Query Services
PDF
Foliage Measurement Using Image Processing Techniques
PDF
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
PDF
Comparative Study on NDCT with Different Shell Supporting Structures
PDF
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
PDF
A Five – Level Integrated AC – DC Converter
PDF
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
PDF
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Beaglebone Black Webcam Server For Security
Biometrics Authentication Using Raspberry Pi
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Raspberry Pi Based Client-Server Synchronization Using GPRS
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
Improved Trans-Z-source Inverter for Automobile Application
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Optimizing Data Confidentiality using Integrated Multi Query Services
Foliage Measurement Using Image Processing Techniques
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Comparative Study on NDCT with Different Shell Supporting Structures
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
A Five – Level Integrated AC – DC Converter
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation

Recently uploaded (20)

PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Pharma ospi slides which help in ospi learning
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
master seminar digital applications in india
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Lesson notes of climatology university.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Classroom Observation Tools for Teachers
2.FourierTransform-ShortQuestionswithAnswers.pdf
Computing-Curriculum for Schools in Ghana
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Microbial diseases, their pathogenesis and prophylaxis
O5-L3 Freight Transport Ops (International) V1.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Final Presentation General Medicine 03-08-2024.pptx
Pharma ospi slides which help in ospi learning
Module 4: Burden of Disease Tutorial Slides S2 2025
master seminar digital applications in india
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Chinmaya Tiranga quiz Grand Finale.pdf
RMMM.pdf make it easy to upload and study
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
01-Introduction-to-Information-Management.pdf
Lesson notes of climatology university.
Final Presentation General Medicine 03-08-2024.pptx
Classroom Observation Tools for Teachers

Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 192 Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion G. Mathumitha PG Scholar, Department of CSE, Paavai College of Engineering, Namakkal, India. R. Murugesan Assistant Professor, Department of CSE, Paavai College of Engineering, Namakkal, India. Abstract—Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims at finding the originality of an image. Due to the advent of many image editing software image tampering has become common. The Enhanced hashing approach is suggested for image authentication. The concept of Hashing has been used for searching images from large databases. It can also be applied to image authentication as it produces different results with respect to the change in image. But the hashing methods used for similarity searches cannot be used for image authentication since they are no sensitive for small changes. Moreover, we need a system that detects only perceptual changes. A new hashing method, namely, enhanced robust hashing is proposed for image authentication, which uses global and local properties of an image. This method is developed for detecting image forgery, including removal, insertion, and replacement of objects, and abnormal color modification, and for locating the forged area. The local models include position and texture information of object regions in the image. The hash mechanism uses secret keys for encryption and decryption. IP tracing is done to track the suspicious nodes. Index Terms—Image forgery, image hashing, global and local properties, perceptual hashing, image authentication ——————————  —————————— 1 INTRODUCTION Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against security attacks. Hence, image authentication has become a mandatory process in image sharing. An image hash function maps an image to a short binary string based on the image's appearance to the human eye. With advancement in technology, there are many multimedia data available over the internet. As storage becomes less costly, all the data are stored in database as blob objects. One primitive way for dealing with massive multimedia databases is the similarity search problem. It aims to retrieve similar objects to the query object from the database. Particularly, similarity search is at the heart of many multimedia applications, such as image retrieval, video recommendation, event detection, and face recognition. To improve the performance of similarity search, a long stream of research efforts has been made in the database community. Because of the difference in dimensionality it is difficult to find the exact image using similarity search. To address this issue approximate similarity search has been implemented in recent years, which brings related images as a result instead of exact images for the given query. With the advent of many image editing software and its widespread use, image authentication becomes important to avoid image forgery. Hashing can be efficiently used to authenticate an image since a small change in the image will produce a different hash code when the same hash function is used. In general, a hash should be short, robust against simple image modifications and sensitive against major modifications. Therefore the objective is to provide a reasonably short hash code for an image with good performance. Global moments of the luminance and chrominance components are used to reflect the image’s global characteristics, and extract local texture features from salient regions in the image to represent the contents in the corresponding areas. 2 PROPOSED IMAGE AUTHENTICATION PROTOCOL Many previous schemes are either based on global or local features. Global features are generally short but insensitive to changes of small areas in the image, while local features can reflect regional modifications but usually produce longer hashes. Therefore, a method that generates reasonably short hash code and better reflects the properties of an image is required. The proposed work focuses on efficient and automatic techniques to
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 193 identify and verify the contents of digital images. The services provided by the proposed image authentication system are mentioned below. 1. Identify the received image as a similar image, or a tampered image, or a different image. 2. Evaluate similarity of two images by calculating the distance between them. 3. Identify and locate three types of tampered area: Added area, Removed area, Changed area. 4. Estimate the percentage of tampered area. Fig. 1. Process steps for image authentication. When an image is sent to the user, a possible solution to prove authenticity is to generate a hash value and send it securely to the user. The hash value is a compact string. It can be called as an abstract of the content. A user can regenerate hash value from the received image, and compare it with the original hash value. If they match, the content is considered as authentic. In order to allow incidental distortion, the hash value must possess some robustness. In [1], the authors generated image hash using Zernike Moments and local features. But the Salient region is detected as rectangular boxes which include some background details and does not clearly show the salient region. In order identify the salient region edge detection mechanism is used in the proposed work. And also IP tracing is enabled in the proposed system to find the malicious node where the image got tampered. Fig.3 explains the process steps of the proposed image authentication protocol. The image is first rescaled to a fixed size and converted from RGB to grayscale. These steps are covered under the preprocessing step. The aim of rescaling is to ensure that the generated image hash has a fixed length and the same computation complexity. Next global and local features are extracted. Then the Global and local features are concatenated to construct a final hash value. 2.1 Edge Detection Mechanisms Our proposed work includes research on the embedding algorithm robust to geometric distortions and improving the precision in locating the altered areas by implementing via any digital multimedia networking application for verifying the content of image transmission over RGB features. So this kind of implementation is desired to find features that best represent the image contents so as to enhance the hash’s sensitivity to small area tampering while maintaining short hash length, good robustness against normal image processing like edge detection mechanisms and include tracer routing to detect the content modified hacker system which is use full to reduce the hacking possibilities. So without knowledge of this method, hacker information may be acknowledged to the sender once the hacker receives the packet for content or object modifications. Fig. 2. Salient feature identification using Edge detection. Here, in the final image salient features are highlighted. Instead of rectangular boxes only the edges were traced thus giving only the salient feature. Hash can be constructed for the detected regions and transmitted along with the original image to the receiver. 2.2 Hashing Generation and Encryption The global and object local vectors are concatenated to form an intermediate hash, which is then pseudo-randomly scrambled based on a secret key to produce the final hash sequence. Advanced encryption algorithms are used to encrypt the hash sequence with respect to secret keys. Received Image Preprocessing Edge detection Hash construction Fake image Original Image IP tracing End Process Malicious Node Identified Hash Function Match with original hash YesNo
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 194 The user regenerates the hash value from the received image after successfully decrypting it and compares it with the original hash value. If they match, the content is considered as authentic. Otherwise the received image is identified as a fake one. 2.3 Hamming Distance Matching Distance between hashes of an image pair is used as a metric for finding similarity or dissimilarity of the two images. The hash sequence of a received image needs to be tested with the decrypted hash sequence under similarity ratio. If the difference is above the threshold then it has been maliciously tampered else it is considered as legitimate image. 2.4 IP Tracing Tracer routing is used to find out the unauthorized router or the system that purposefully modified the content of the image and forwarded it to the destination in a routing process. This can be done by getting acknowledgment from every router in the routing process by a source. Then source compares the acknowledgement with the predefined routing table for any routing delay or IP mismatch. Thus the attacker node can be identified and reported. 3 DISCUSSION AND CONCLUSION The proposed image hashing approach is developed using both global and local features. Image hashes produced with the proposed method are robust against common image processing operations like brightness adjustment, rescaling and addition of noise. The IP tracing mechanism helps to find the malicious node thus providing a full fledged authentication mechanism. REFERENCES [1] Robust Hashing for Image Authentication Using Zernike Moments and Local Features Yan Zhao, Shuozhong Wang, Xinpeng Zhang, and Heng Yao, Member, IEEE. [2] S. Xiang, H. J. Kim, and J. Huang, ―Histogram-based image hashing scheme robust against geometric deformations,‖ in Proc. ACM Multimedia and Security Workshop, New York, 2007, pp. 121–128. [3] V. Monga, A. Banerjee, and B. L. Evans, ―A clustering based approach to perceptual image hashing,‖ IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 68–79, Mar. 2006. [4] Robust Hashing with Local Models for Approximate Similarity Search Jingkuan Song, Yi Yang, Xuelong Li, Fellow, IEEE, Zi Huang, and Yang Yang [5] Bohm C., Berchtold S., and Keim D. A.(2001), ―Searching in high-dimensional spaces: Index structures for improving the performance of multimedia databases,‖ ACM Comput. Survey, vol. 33, no. 3, pp. 322–373. [6] Cappelli R. (2011), ―Fast and accurate fingerprint indexing based on ridge orientation and frequency,‖ TSMCB, vol. 41, no. 6, pp. 1511–1521. [7] Datar M. and Indyk P. (2004), ―Locality-sensitive hashing scheme based on p-stable distributions,‖ in Proc. SCG, pp. 253–262. [8] Datta R., Joshi D., Li J., and Wang J. Z. (2008), ―Image retrieval: Ideas, influences, and trends of the new age,‖ ACM Comput. Survey, vol. 40. [9] Gionis A., Indyk P., and Motwani R. (1999), ―Similarity search in high dimensions via hashing,‖ in Proc. VLDB, pp. 518–529. [10] Jagadish H. V., Ooi B. C., Tan K. L., Yu C., and Zhang R. (2005), ―iDistance: An adaptive B+-tree based indexing method for nearest neighbor search,‖ ACM TODS, vol. 30, no. 2, pp. 364–397. [11] Jingkuan Song, Yi Yang, Xuelong Li, Fellow, IEEE, Zi Huang, and Yang Yang (2014) "Robust Hashing With Local Models for Approximate Similarity search" IEEE transactions on cybernetics, vol. 44, no. 7 [12] Lv Q., Josephson W., Wang Z., Charikar M. and Li K.(2007), ―Multi-probe LSH: Efficient indexing for high- dimensional similarity search,‖ in Proc. VLDB, pp. 950–961. [13] Salakhutdinov R. and Hinton G. E. (2009), ―Semantic hashing,‖ Int. J. Approx. Reasoning, vol. 50, no. 7, pp. 969– 978. [14] Shen H. T., Ooi B. C. and Zhou X. (2005), ―Towards effective indexing for very large video sequence database,‖ in Proc. SIGMOD, pp. 730–741. [15] Tao Y., Yi K., Sheng C., and Kalnis P. (2010), ―Efficient and accurate nearest neighbor and closest pair search in high- dimensional space,‖ ACM TODS, vol. 35, no. 3. [16] Weiss Y., Torralba A., and Fergus R. (2008), ―Spectral hashing,‖ in Proc. NIPS, pp. 1753–1760. [17] Yang Y., Xu D., Nie F., Luo J. and Zhuang Y. (2009), ―Ranking with local regression and global alignment for cross media retrieval,‖ in Proc. ACM Multimedia, pp. 175– 184. [18] Zhang D., Wang J., Cai D. and Lu J. (2010), ―Self-taught hashing for fast similarity search,‖ in SIGIR, pp. 18–25. [19] Zhang L., Wang L., and Lin W. (2012), ―Generalized biased discriminant analysis for content-based image retrieval,‖ TSMCB, vol. 42, no. 1, pp. 282–290.