Sciweavers

ICIP
2007
IEEE

Robust Hash for Detecting and Localizing Image Tampering

14 years 6 months ago
Robust Hash for Detecting and Localizing Image Tampering
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations (like image tampering) and distinct queries. Although existing methods try to address the first issue, the second issue has not been adequately looked into, primarily the issue of localizing tampering. This is primarily because of the difficulty in meeting two contradictory requirements. First, the hash should be small and second, to detect localized tampering, the amount of information in the hash about the original should be as large as possible. The desynchronization of the query with the original further aggravates the problem. Hence a tradeoff between these factors needs to be found. This paper presents an image hashing approach that is both robust and sensitive to not only detect but also localize tampering using a small signature (< 1kB). To our knowledge this is the first hashing method that can localize image tampering using a small signature that is not embedded into the ...
Sujoy Roy, Qibin Sun
Added 21 Oct 2009
Updated 27 Oct 2009
Type Conference
Year 2007
Where ICIP
Authors Sujoy Roy, Qibin Sun
Comments (0)