Next Article in Journal
Vital, Sophia, and Co.—The Quest for the Legal Personhood of Robots
Previous Article in Journal
A Web Page Clustering Method Based on Formal Concept Analysis
Article Menu

Export Article

Open AccessArticle
Information 2018, 9(9), 229; https://doi.org/10.3390/info9090229

Perceptual Hashing Based Forensics Scheme for the Integrity Authentication of High Resolution Remote Sensing Image

1
School of Networks and Tele-Communications Engineering, Jinling Institute of Technology, Nanjing 211169, China
2
Key Laboratory of Resource and Environment Information System, Institute of Geographic Sciences and Natural Resources Research, Chinese Academy of Science, Beijing 100101, China
3
Nanjing Innovation Centre of Intelligent Transportation System, Nanjing 211169, China
4
Key Laboratory of Digital Earth Science, Institute of Remote Sensing and Digital Earth, Chinese Academy of Sciences, Beijing 100094, China
5
School of Intelligent Science and Control Engineering, Jinling Institute of Technology, Nanjing 211169, China
6
Nanjing Software Institute, Jinling Institute of Technology, Nanjing 211169, China
*
Author to whom correspondence should be addressed.
Received: 14 August 2018 / Revised: 2 September 2018 / Accepted: 5 September 2018 / Published: 7 September 2018
(This article belongs to the Special Issue The Security and Digital Forensics of Cloud Computing)
Full-Text   |   PDF [4639 KB, uploaded 7 September 2018]   |  

Abstract

High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet the requirements. In this paper, a perceptual hashing based forensics scheme is proposed for the integrity authentication of a HRRS image. The proposed scheme firstly partitions the HRRS image into grids and adaptively pretreats the grid cells according to the entropy. Secondly, the multi-scale edge features of the grid cells are extracted by the edge chains based on the adaptive strategy. Thirdly, principal component analysis (PCA) is applied on the extracted edge feature to get robust feature, which is then normalized and encrypted with secret key set by the user to receive the perceptual hash sequence. The integrity authentication procedure is achieved via the comparison between the recomputed perceptual hash sequence and the original one. Experimental results have shown that the proposed scheme has good robustness to normal content-preserving manipulations, has good sensitivity to detect local subtle and illegal tampering of the HRRS image, and has the ability to locate the tampering area. View Full-Text
Keywords: perceptual hashing; forensics of tampering; high-resolution remote sensing image; image security; integrity authentication perceptual hashing; forensics of tampering; high-resolution remote sensing image; image security; integrity authentication
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Ding, K.; Meng, F.; Liu, Y.; Xu, N.; Chen, W. Perceptual Hashing Based Forensics Scheme for the Integrity Authentication of High Resolution Remote Sensing Image. Information 2018, 9, 229.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top