Journal of Applied Sciences ›› 2012, Vol. 30 ›› Issue (1): 75-81.doi: 10.3969/j.issn.0255-8297.2012.01.012

• Signal and Information Processing • Previous Articles     Next Articles

Perpetual Image Hashing Based on Conformal Mapping and Zernike Moments

ZHAO Yan1;2, WANG Shuo-zhong1, YAO Heng1, WU Wei1   

  1. 1. Department of Communication and Information Engineering, Shanghai University, Shanghai 200072, China
    2. Department of Computer and Information Engineering, Shanghai University of Electric Power,
    Shanghai 200090, China
  • Received:2011-01-30 Revised:2011-09-13 Online:2012-02-09 Published:2012-01-30

Abstract:

Abstract: We propose a perpetual image hashing method applicable to image authentication and tamper detection. The input image is pseudo-randomly partitioned into blocks, which are resized to become squares of a standard size and mapped to a unit circle by conformal mapping. Zernike moments of the circular-shaped “images” are calculated, and then modified by multiplying an exponent to achieve phase rotation-invariance.
All amplitudes and phases of the modified Zernike moments are concatenated to form an intermediate Hash sequence. The final Hash is produced by pseudo-randomly permuting the intermediate Hash. The purpose of conformal mapping is to include information contained in the corners of square image blocks into the extracted image Hash so that the tamper detection capability is significantly enhanced. Experimental results show that the proposed method is robust against most content-preserving image processing operations. Image blocking allows the tampered regions in the image to be correctly located. Compared to some other techniques, the method has low probabilities of collision and less error in tamper detection.

Key words: image Hash, conformal mapping, Zernike moments, image authentication, tampering detection

CLC Number: