Top Banner
D Abst devecolosecufind make Key 1. With peop imag and techn techn chan shor can b 2. In fe featu featu max elem A.Z In g dista Devel tract: Nowada loped which hur modificatiority skin based whether the im e the image sec ywords: robust Introducti h the multim ple use variou ge for differen fake images niques are de niques is ima nges are done rt sequence in be used for im Feature Ex eature extract ure vector, wh ure extraction ximizes the r ment. ernike Mome general, mom ance from a re Moments pro Set of orthogo Simply the pr orthogonal ba I opmeF ays image forg as three secret n and locating d biometric valu mage is similar cure. And the im t hashing, forge on media technolo us image editi nt purposes. S users find it eveloped recen age hashing. e. Image hash image to repr mage authentic xtraction tion stage eac hich becomes n is to extr recognition ra ents ments describ eference point oduced using o onal polynom rojection of th asis functions. Internation V nt and Forged D geries are don t keys. It is als g forged areas. ues are added or forged. A ne mage will be re ery detection, sk ogy developm ing software t So, to differen difficult. Im ntly. One of t It is very se hing is a techn resent its cont cation. ch character i s its identity. ract a set o ate with the e numeric q or axis. orthogonal bas mials defined o he image funct . nal Journal ISSN ( Volume 3 I w d Calib d ImaD. Subitha P 1, 2 BSA Univer e in many waso used to dete Hash values with the hash etwork called tr etrieved and res kin based biome ment, most o tools to chang ntiate from ori mage authentic the most impo ensitive while nique that ex tent. And ther is represented The major go f features, w least amoun quantities at sis sets. on the unit disk tion onto thes l of Science (Online): 231 Issue 2, Feb www.ijsr.ne brating ge Au Priyadharshi rsity, Vandalur, ys using softw ct image forge are developed b construction. A riple key chaot stored. etrics, chaotic n of the ge the iginal cation ortant e any xtracts refore d as a oal of which nt of some k. e Whe respe phas appli imag infor featu weak may magn B.Sa A s atten view prior the r e and Resea 19-7064 bruary 2014 et g Feat uthenti ini 1 , P. May , Chennai, India ware tools. To ery including iby concatenati A test image is tic neural netwo neural network ere |Anm| and ectively. In th se would cha ications use Z ge features. S rmation of t ures without t k descriptive even conta nitude. aliency Regio alient region ntion. Accordi wed as a sum r knowledge . redundant part arch (IJSR 4 tures f ication a 2 a avoid the imag nsertion, remo ing local featucompared with ork is impleme d φnm repres he magnitude ange with im ZM magnitud Since the pha the original the phase inf effectiveness ain more c on n in an imag ing to [17], in of two parts: The informati t is removed. Figure 1: Re R) for Di n ge forgery a h val, object rep res and global h the hash of a ented and it’s a sent the mag e remains unc mage rotation. de alone as r ase compone image, any formation cou . In fact, the content infor ge is one th nformation in : that of inno ion of saliency ference image igitally ash method is lacement, abnl features. For a reference ima versatile netwo gnitude and p changed whil Therefore, m rotation in va ent captures m ZM-based im uld have relat phase compo rmation than hat attracts v n an image ca ovation and th y is obtained w e y been ormal more age to ork to phase, e the many ariant much mage tively onent the visual an be hat of when Paper ID: 02013969 364
6

Forged Image Authentication

Mar 01, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Forged Image Authentication

D

Abstdevelcolousecurfindmake Key

1. Withpeopimagand techntechnchanshorcan b 2. In fefeatufeatumaxelem A.Z In gdista

Devel

tract: Nowadaloped which haur modificationrity skin basedwhether the ime the image sec

ywords: robust

Introducti

h the multimple use variouge for differenfake images niques are deniques is ima

nges are donert sequence in be used for im

Feature Ex

eature extracture vector, whure extraction

ximizes the rment.

ernike Mome

general, momance from a re

Moments proSet of orthogo

Simply the prorthogonal ba

I

opmenF

days image forgas three secretn and locating

d biometric valumage is similar cure. And the im

t hashing, forge

on

media technolous image editint purposes. Susers find it

eveloped recenage hashing. e. Image hash

image to reprmage authentic

xtraction

tion stage eachich becomesn is to extrrecognition ra

ents

ments describeference point

oduced using oonal polynom

rojection of thasis functions.

Internation

V

nt andForged

D

geries are dont keys. It is als

g forged areas. ues are added wor forged. A nemage will be re

ery detection, sk

ogy developming software tSo, to differen

difficult. Imntly. One of tIt is very se

hing is a technresent its contcation.

ch character is its identity. ract a set oate with the

e numeric qor axis.

orthogonal basmials defined o

he image funct.

nal JournalISSN (

Volume 3 Iw

d Calibd ImagD. Subitha P

1, 2BSA Univer

e in many wayso used to dete

Hash values awith the hash cetwork called tretrieved and res

kin based biome

ment, most otools to changntiate from ori

mage authenticthe most impoensitive whilenique that extent. And ther

is representedThe major gof features, w

least amoun

quantities at

sis sets. on the unit disk

tion onto thes

l of Science(Online): 231

Issue 2, Febwww.ijsr.ne

bratingge Au

Priyadharshi

rsity, Vandalur,

ys using softwct image forgeare developed bconstruction. Ariple key chaotstored.

etrics, chaotic n

of the ge the iginal cation ortant e any

xtracts refore

d as a oal of which nt of

some

k.

e

Wherespephasappliimaginforfeatuweakmaymagn B.Sa A sattenviewpriorthe r

e and Resea19-7064

bruary 2014et

g Featuthenti

ini1, P. May

, Chennai, India

ware tools. To aery including inby concatenatiA test image istic neural netwo

neural network

ere |Anm| andectively. In thse would chaications use Zge features. Srmation of tures without tk descriptive

even contanitude.

aliency Regio

alient regionntion. Accordiwed as a sumr knowledge .redundant part

arch (IJSR

4

tures ficationa2

a

avoid the imagnsertion, remoing local featurcompared withork is impleme

d φnm represhe magnitude

ange with imZM magnitudSince the phathe original the phase infeffectivenessain more c

on

n in an imaging to [17], inof two parts:The informatit is removed.

Figure 1: Re

R)

for Din

ge forgery a hval, object repres and globalh the hash of aented and it’s a

sent the mage remains unc

mage rotation. de alone as rase componeimage, any

formation cou. In fact, the

content infor

ge is one thnformation in: that of innoion of saliency

ference image

igitally

ash method islacement, abno

l features. Fora reference ima

versatile netwo

gnitude and pchanged whil

Therefore, mrotation in vaent captures m

ZM-based imuld have relat

phase compormation than

hat attracts vn an image caovation and thy is obtained w

e

y

been ormalmore

age to ork to

phase, e the many ariant much mage tively onent the

visual an be hat of when

Paper ID: 02013969 364

Page 2: Forged Image Authentication

C.T Text[18] to vlikenskew 3. (Merobsemethbehaa)

b)

Fig

Figure 4: Sa

exture Featu

ture is an impand [19], the

isual perceptiness, regularitwness and kurt

Biometric

rriam-Websteervations andhods of recogavioral characPhenotypic bthat are acquiGenotypic bioor traits.

I

Figure 2: S

gure 3: Salien

liency region recta

ures

portant featuree authors propion: coarsenesty and roughntosis are used

Key Value

er online): the d phenomenagnizing a persteristic. iometric – basired through eometric – base

Internation

V

Saliency map

ncy threshold m

marked with angles

e to human vipose six texturss, contrast, dness. Here co.

es

statistical anaa. Biometricson based on

sed upon featuexperience anded upon genet

nal JournalISSN (

Volume 3 Iw

map

circumscribed

isual perceptiore features reldirectionality,oarseness, con

alysis of biolocs are autom

a physiologic

ures or behavid developmentic characteris

l of Science(Online): 231

Issue 2, Febwww.ijsr.ne

d

on. In lating line-

ntrast,

ogical mated cal or

iors nt. stics

Biom a)b)c)d)e) Face I. Im a)b)

II. F a)b)c)

e and Resea19-7064

bruary 2014et

metric values a

Fingerprint Voice Iris/retina Gait Face Recogni

e Recognition

mage Based

Statistical basTemplate mat

eature Based

Geometric Feature metriMorphable m

arch (IJSR

4

are used in dif

ition

Techniques

sed on O(2nd)tching

Figure 5: Or

cs (spatial relmodels (shape/t

Figure 6: Fa

R)

fferent techno

)

riginal image

ationships) texture)

ace detection

ologies. They a

are;

Paper ID: 02013969 365

Page 3: Forged Image Authentication

International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064

Volume 3 Issue 2, February 2014 www.ijsr.net

4. Proposed Hashing Scheme In this section, we describe the proposed image hashing scheme and the procedure of image authentication using the hash. The hash is formed from Zernike moments to represent global properties of the image, and the texture features in salient regions to reflect local properties. A.Image Hash Construction The image hash generation procedure includes the following steps; Pre-Processing: The image is first rescaled to a fixed size with bilinear interpolation, and converted from RGB to the YCbCr representation. Y and are used as luminance and chrominance components of the image to generate the hash. The aim of rescaling is to ensure that the generated image hash has a fixed length and the same computation complexity.

Figure 7: Block diagram of the proposed image hashing

method B.Image Authentication In image authentication, the hash of a trusted image, is available and called the reference hash. The hash of a received image to be tested is extracted using the above method. These two hashes are compared to determine whether the test image has the same contents as the trusted one or has been maliciously tampered, or is simply a different image. Here, two images having the same contents (visual appearance) do not need to have identical pixel values. One of them, or both, may have been modified in normal image processing such as contrast enhancement and lossy compression. In this case, we say the two images are perceptually the same, or similar. The image authentication process is performed in the following way. 1. Feature Extraction: Pass the test image through the steps

as described in Section A to obtain the intermediate hash without encryption, namely.

2. Hash Decomposition: With the secret keys and Restore the intermediate hash from the reference hash to obtain which is a concatenated feature sequence of the trusted image, decompose it into global and local features.

3. Salient Region Matching: Check if the salient regions found in of the test image match those in of the trusted image. If the matched areas of a pair of regions are large

enough, the two regions are considered as being matched. Reshuffle the texture vectors by moving the matched components in each of the texture vector pair to the left-most and, for notational simplicity, still call them and . For example, if there are three salient regions in the reference image and two in the test image, The first two pairs of sub vectors in and may either be Matched or unmatched. The vectors and are reshuffled accordingly.

4. Distance Calculation and Judgment: We use a distance between hashes of an image pair as a metric to judge similarity/ dissimilarity of the two images. To define the hash distance, a feature vector is formed by concatenating the global feature vector and the reshuffled texture feature vector, namely. The vector does not contribute to the distance calculation but will be used to locate forged regions. The hash distance between the test image and the reference is the Euclidean distance between and for a pair of similar images; texture features in the corresponding salient regions are close to each other. However, since no currently available method of saliency detection is perfect, the salient regions obtained from an image after content-preserving processing may not always precisely match that of the original. If this happens, difference between the test image and the original will be exaggerated. In practice, the global structure of an image represented by Zernike moments is sufficient to distinguish similar from dissimilar.

C.Forgery Classification and Localization Having found that a test image is a fake, the next job is to locate the forged region and tell the nature of forgery. Four types,

Figure 8: Forgery classification and localization

1. If, some objects have been removed from the received test

image, Positions of the missing objects are located by comparing the saliency indices.

2. If, the test image contains some additional objects whose positions are located by comparing the saliency indices.

3. If, check the luminance and chrominance components in the Zernike moments and calculate the following distances: If is greater than by a threshold, the test image contains substantial colour changes with respect to the reference image while the luminance changes are considerably smaller.

4. If and is less than, the test image contains replaced objects because in this case, luminance changes are dominant. Calculate the distance between the texture feature vectors of each salient region, the salient region having maximal is recognized as being replaced.

Paper ID: 02013969 366

Page 4: Forged Image Authentication

International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064

Volume 3 Issue 2, February 2014 www.ijsr.net

5. If and, some of the salient regions are not matched. Mark the mismatched salient regions in the test image as being tampered.

5. Chaotic Neural Network

The meaning of chaos is not generally accepted but from a practical point of view chaos can be defined as bounded steady stat behaviour that is not equilibrium point not periodic and not quasi periodic. It is a random and look like a noise but deterministic. Chaotic systems are non periodical sensitive to initial conditions, system parameters and topological transitivity. These properties are also remarkable for cryptanalysts. Noise like behaviour of chaotic system is main reason of using this system in cryptology. Chaotic spectrum does not have discreet frequencies but has a continuous, broad band nature. Chaos signals are considering better for practical because of its characteristics above mentioned. Field of information security is nothing but the combination of two concepts that are cryptography and chaos theory. A network is called chaotic neural network if its weights and biases are determined by chaotic sequence. It is a stochastic behaviour occurring in deterministic system. In this, we consider the Hopfield neural networks which exhibit chaotic phenomenon. x’ (t)= – Cx(t) + Af (x(t)) + Bf(x (t –_(t)) + I (1) x’i(t)= -cixi(t) + _ajfi(xi(t)) +_ bj fj(xj(t-_j(t))) + Ii, i=1, 2, 3……n Where, n denotes the number of units in a neural network. Pseudorandom number sequences with good properties are frequently used in secure communications and cryptosystem. Iterative equations are used to generate the chaotic dynamics. Computation time for encryption and decryption depends on complexity of equations and value of state variables. If complexity of equation is low, computation time for encryption and decryption will be less otherwise it will take long time for computation. If the equation is with lower complexity then discrete map have to preferred, it involves basic arithmetic operation like addition, subtraction, multiplication and division. On the other hand, if the behaviour of chaotic equation is continuous in nature, it involves differential or integral operations to calculate value of the next state variable. Complexity of equation is low, computation time for encryption and decryption will be less otherwise it will take long time for computation. If the equation is with lower complexity then discrete map have to preferred, it involves basic arithmetic operation like addition, subtraction, multiplication and division. On the other hand, if the behaviour of chaotic equation is continuous in nature, it involves differential or integral operations to calculate value of the next state variable. From complexity point of view, integral value of the state variable is preferred because it takes shorter time for computing next state variable, if it is floating point then takes longer time for computation. A.Secret Keys Cryptography is the exchange of information among the users without leakage of information to others. Much public key cryptography is available which are based on number theory but it has the drawback of requirement of large computational

power, complexity and time consumption during generation of key. To overcome these drawbacks, a neural network can be used to generate secret key. Many methods use chaotic neural network for cryptography here in this paper ‘Triple key’ is using in the network to encrypt and decrypt the data. Three different parameters which are decided by user are used to scramble the image data and so hackers get many difficulties to hack the data hence providing more security. For simulation MATLAB software is used. The experimental results shows that algorithm successfully perform the cryptography and highly sensitive to the small changes in key parameters. B.Triple Key Chaotic Neural Network In triple key chaotic encryption method, 20 hexadecimal characters are entered as a session key. The finalisation of this hexadecimal key gives 80 bits. Some bits are extracted and some manipulations are performed on it to obtain the intermediate key. This intermediate key is combined with initial and control parameters to generate chaotic sequence. This is the concept of ‘Triple key’. In this, there is three step protections to the original image. User has to enter three keys to decrypt the image. 6. Algorithm

1. Read the image.

2. Determine the size and length of image.

3. Converting two dimensional image vector in one dimensional image vector.

4. Computing initial parameter from hexadecimal session key, A=a1a2a3…a20. It consists of 80 bits i.e. binary representation of hexadecimal key.

5. X (1) = (s1+s2+s3) mod 1. Where, s1= (a71*2^0+….a84*2^7+a124*2^23)/2^24 s2= (a13+a14+….a18)/(16*6) s3= entered

6. Determine parameter μ.

7. Generate the chaotic sequence x (1), x (2), x (3)….. X (M) by the formula X (n + 1) = mx(n) (1 – x(n)) Create b (0), b (l)... b (8M – 1) from x (l), x (2) ... x (M) by the generating scheme that b (8m – 8)b(8m – 7)….. b (8m – 2) b(8m – l) … is the binary Representation of x(m) for m = 1, 2….M.

8. Weights and theta are decided for n = 0 to M – 1 For i = 0 to 7 j={0, 1, 2, 3, 4, 5, 6, 7} End For i = 0 to 7 where f(x) is 1 if x >=0` End End

Paper ID: 02013969 367

Page 5: Forged Image Authentication

International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064

Volume 3 Issue 2, February 2014 www.ijsr.net

7. Simulation Results 1. Input Image

Figure 9: Reference input image

Figure 8 states about the input reference image given for operation. 2. Input Forged Image

Figure 10: Forged Image

In this fig the input image is forged and given as the second image to be compared. 3. Output Rectangle Image

Figure 11: Output Rectangled Forged Image

4. GUI Window

Figure 12: Output Window

4. Image Restoration

Figure 13: Restored Image

8. Conclusion The results of salient region detection for position vectors and plotted the rectangles in the reference image and then the texture features are calculated. The Skin based biometric keys of 140 values were added to extract the image in face

Paper ID: 02013969 368

Page 6: Forged Image Authentication

International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064

Volume 3 Issue 2, February 2014 www.ijsr.net

detection. Finally decompose the hash in the authentication part and finding the distance to determine whether the image is ‘similar ‘or a ‘forgery one. So if Image is forged it classifies what type of forgeries has occurred i.e. removal, insertion, object replacement and colour modifications and also locate the forged area.. And the image is retrieved and restored as the original image. In future we can reduce the values of hash.

References

[1] F. Ahmed, M. Y. Siyal, and V. U. Abbas, “A secure and robust hash based scheme for image authentication,” Signal Process., vol. 90, no. 5, pp. 1456–1470, 2010

[2] Z. Chen and S. K. Sun, “A Zernike moment phase based descriptor for local image representation and matching,” IEEE Trans. Image Process., vol. 19, no. 1, pp. 205–219, Jan. 2010

[3] T. Deselaers, D. Keysers, and H. Ney, “Features for image retrieval: A quantitative comparison,” in Lecture Notes in Computer Science, 2004, vol. 3175, pp. 228–236, Springer

[4] K. Fouad and J. Jianmin, “Analysis of the security of perceptual image hashing based on non-negative matrix factorization,” IEEE Signal Process.Lett., vol. 17, no. 1, pp. 43–46, Jan. 2010

[5] X. Hou and L. Zhang, “Saliency detection: A spectral residual approach,” in Proc. IEEE Int. Conf. Computer Vision and Pattern Recognition, Minneapolis, MN, 2007, pp. 1–8

Paper ID: 02013969 369