Abstract
The distribution of digital images with the classic and newest technologies available on Internet (e.g., emails, social networks, digital repositories) has induced a growing interest on systems able to protect the visual content against malicious manipulations that could be performed during their transmission. One of the main problems addressed in this context is the authentication of the image received in a communication. This task is usually performed by localizing the regions of the image which have been tampered. To this aim the received image should be first registered with the one at the sender by exploiting the information provided by a specific component of the forensic hash associated with the image. In this paper we propose a robust alignment method which makes use of an image hash component based on the Bag of Visual Words paradigm. The proposed signature is attached to the image before transmission and then analyzed at destination to recover the geometric transformations which have been applied to the received image. The estimator is based on a voting procedure in the parameter space of the geometric model used to recover the transformation occurred to the received image. Experiments show that the proposed approach obtains good margin in terms of performances with respect to state-of-the art methods.
Chapter PDF
Similar content being viewed by others
Keywords
References
Farid, H.: Digital doctoring: how to tell the real from the fake. Significance 3(4), 162–166 (2006)
Battiato, S., Farinella, G.M., Messina, E., Puglisi, G.: Understanding Geometric Manipulations of Images Through BOVW-Based Hashing. In: IEEE International Workshop on Content Protection & Forensics, held in conjunction with the IEEE International Conference on Multimedia & Expo (2011)
Lin, Y.-C., Varodayan, D., Girod, B.: Image authentication based on distributed source coding. In: IEEE International Conference on Image Processing, pp. 3–8 (2007)
Roy, S., Sun, Q.: Robust hash for detecting and localizing image tampering. In: IEEE International Conference on Image Processing, pp. 117–120 (2007)
Lu, W., Varna, A.L., Wu, M.: Forensic hash for multimedia information. In: IS&T-SPIE Electronic Imaging Symposium - Media Forensics and Security (2010)
Lu, W.J., Wu, M.: Multimedia forensic hash based on visual words. In: IEEE International Conference on Image Processing, pp. 989–992 (2010)
Szeliski, R.: Image alignment and stitching: A tutorial. Foundations and Trends in Computer Graphics and Computer Vision 2(1), 1–104 (2006)
Csurka, G., Dance, C.R., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: ECCV International Workshop on Statistical Learning in Computer Vision (2004)
Lowe, D.: Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision 60(2), 91–110 (2004)
Lazebnik, S., Schmid, C., Ponce, J.: Beyond bags of features: Spatial pyramid matching for recognizing natural scene categories. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2169–2178 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Battiato, S., Farinella, G.M., Messina, E., Puglisi, G. (2011). A Robust Forensic Hash Component for Image Alignment. In: Maino, G., Foresti, G.L. (eds) Image Analysis and Processing – ICIAP 2011. ICIAP 2011. Lecture Notes in Computer Science, vol 6978. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24085-0_49
Download citation
DOI: https://doi.org/10.1007/978-3-642-24085-0_49
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24084-3
Online ISBN: 978-3-642-24085-0
eBook Packages: Computer ScienceComputer Science (R0)