Next Article in Journal
Depolarizing Channel Mismatch and Estimation Protocols for Quantum Turbo Codes
Previous Article in Journal
Measurement Based Quantum Heat Engine with Coupled Working Medium
Open AccessArticle

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids

1
Department of Electrical Engineering, HITEC University Taxila, Punjab 47080, Pakistan
2
School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK
3
College of Computer Science and Engineering, Taibah University, Al-Madinah P.O. Box 344, Saudi Arabia
4
RIADI Laboratory, University of Manouba, Manouba 2010, Tunisia
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(11), 1132; https://doi.org/10.3390/e21111132
Received: 4 October 2019 / Revised: 11 November 2019 / Accepted: 14 November 2019 / Published: 19 November 2019
Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and sensitive to malicious tampering. In this paper, a robust and secure image hashing technique using a Gaussian pyramid is proposed. A Gaussian pyramid decomposes an image into different resolution levels which can be utilized to obtain robust and compact hash features. These stable features have been utilized in the proposed work to construct a secure and robust image hash. The proposed scheme uses Laplacian of Gaussian (LOG) and disk filters to filter the low-resolution Gaussian decomposed image. The filtered images are then subtracted and their difference is used as a hash. To make the hash secure, a key is introduced before feature extraction, thus making the entire feature space random. The proposed hashing scheme has been evaluated through a number of experiments involving cases of non-malicious distortions and malicious tampering. Experimental results reveal that the proposed hashing scheme is robust against non-malicious distortions and is sensitive to detect minute malicious tampering. Moreover, False Positive Probability (FPP) and False Negative Probability (FNP) results demonstrate the effectiveness of the proposed scheme when compared to state-of-the-art image hashing algorithms proposed in the literature. View Full-Text
Keywords: hash; digital image; security; distortions; False Positive Probability (FPP); False Negative Probability (FNP) hash; digital image; security; distortions; False Positive Probability (FPP); False Negative Probability (FNP)
Show Figures

Figure 1

MDPI and ACS Style

Bashir, I.; Ahmed, F.; Ahmad, J.; Boulila, W.; Alharbi, N. A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids. Entropy 2019, 21, 1132.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop