SlideShare a Scribd company logo
1 of 3
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
192
Enhanced Hashing Approach For
Image Forgery Detection With
Feature Level Fusion
G. Mathumitha
PG Scholar, Department of CSE,
Paavai College of Engineering,
Namakkal, India.
R. Murugesan
Assistant Professor, Department of CSE,
Paavai College of Engineering,
Namakkal, India.
Abstract—Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims
at finding the originality of an image. Due to the advent of many image editing software image tampering has become common.
The Enhanced hashing approach is suggested for image authentication. The concept of Hashing has been used for searching
images from large databases. It can also be applied to image authentication as it produces different results with respect to the
change in image. But the hashing methods used for similarity searches cannot be used for image authentication since they are no
sensitive for small changes. Moreover, we need a system that detects only perceptual changes. A new hashing method, namely,
enhanced robust hashing is proposed for image authentication, which uses global and local properties of an image. This method is
developed for detecting image forgery, including removal, insertion, and replacement of objects, and abnormal color
modification, and for locating the forged area. The local models include position and texture information of object regions in the
image. The hash mechanism uses secret keys for encryption and decryption. IP tracing is done to track the suspicious nodes.
Index Terms—Image forgery, image hashing, global and local properties, perceptual hashing, image authentication
——————————  ——————————
1 INTRODUCTION
Digital images are increasingly transmitted over non-secure
channels such as the Internet. Therefore, military, medical and
quality control images must be protected against security attacks.
Hence, image authentication has become a mandatory process in
image sharing. An image hash function maps an image to a short
binary string based on the image's appearance to the human eye.
With advancement in technology, there are many multimedia data
available over the internet. As storage becomes less costly, all the
data are stored in database as blob objects.
One primitive way for dealing with massive multimedia
databases is the similarity search problem. It aims to retrieve
similar objects to the query object from the database. Particularly,
similarity search is at the heart of many multimedia applications,
such as image retrieval, video recommendation, event detection,
and face recognition. To improve the performance of similarity
search, a long stream of research efforts has been made in the
database community.
Because of the difference in dimensionality it is difficult to
find the exact image using similarity search. To address this issue
approximate similarity search has been implemented in recent
years, which brings related images as a result instead of exact
images for the given query. With the advent of many image
editing software and its widespread use, image authentication
becomes important to avoid image forgery. Hashing can be
efficiently used to authenticate an image since a small change in
the image will produce a different hash code when the same hash
function is used.
In general, a hash should be short, robust against simple
image modifications and sensitive against major modifications.
Therefore the objective is to provide a reasonably short hash code
for an image with good performance. Global moments of the
luminance and chrominance components are used to reflect the
image’s global characteristics, and extract local texture features
from salient regions in the image to represent the contents in the
corresponding areas.
2 PROPOSED IMAGE AUTHENTICATION PROTOCOL
Many previous schemes are either based on global or local
features. Global features are generally short but insensitive to
changes of small areas in the image, while local features can
reflect regional modifications but usually produce longer hashes.
Therefore, a method that generates reasonably short hash code
and better reflects the properties of an image is required. The
proposed work focuses on efficient and automatic techniques to
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
193
identify and verify the contents of digital images. The services
provided by the proposed image authentication system are
mentioned below.
1. Identify the received image as a similar image, or a
tampered image, or a different image.
2. Evaluate similarity of two images by calculating the
distance between them.
3. Identify and locate three types of tampered area: Added
area, Removed area, Changed area.
4. Estimate the percentage of tampered area.
Fig. 1. Process steps for image authentication.
When an image is sent to the user, a possible solution to prove
authenticity is to generate a hash value and send it securely to the
user. The hash value is a compact string. It can be called as an
abstract of the content. A user can regenerate hash value from the
received image, and compare it with the original hash value. If
they match, the content is considered as authentic. In order to
allow incidental distortion, the hash value must possess some
robustness.
In [1], the authors generated image hash using Zernike
Moments and local features. But the Salient region is detected as
rectangular boxes which include some background details and
does not clearly show the salient region. In order identify the
salient region edge detection mechanism is used in the proposed
work. And also IP tracing is enabled in the proposed system to
find the malicious node where the image got tampered. Fig.3
explains the process steps of the proposed image authentication
protocol.
The image is first rescaled to a fixed size and converted from
RGB to grayscale. These steps are covered under the
preprocessing step. The aim of rescaling is to ensure that the
generated image hash has a fixed length and the same
computation complexity. Next global and local features are
extracted. Then the Global and local features are concatenated to
construct a final hash value.
2.1 Edge Detection Mechanisms
Our proposed work includes research on the embedding
algorithm robust to geometric distortions and improving the
precision in locating the altered areas by implementing via any
digital multimedia networking application for verifying the
content of image transmission over RGB features.
So this kind of implementation is desired to find features that
best represent the image contents so as to enhance the hash’s
sensitivity to small area tampering while maintaining short hash
length, good robustness against normal image processing like
edge detection mechanisms and include tracer routing to detect
the content modified hacker system which is use full to reduce the
hacking possibilities. So without knowledge of this method,
hacker information may be acknowledged to the sender once the
hacker receives the packet for content or object modifications.
Fig. 2. Salient feature identification using Edge detection.
Here, in the final image salient features are highlighted.
Instead of rectangular boxes only the edges were traced thus
giving only the salient feature. Hash can be constructed for the
detected regions and transmitted along with the original image to
the receiver.
2.2 Hashing Generation and Encryption
The global and object local vectors are concatenated to form
an intermediate hash, which is then pseudo-randomly scrambled
based on a secret key to produce the final hash sequence.
Advanced encryption algorithms are used to encrypt the hash
sequence with respect to secret keys.
Received
Image
Preprocessing
Edge detection
Hash
construction
Fake image Original Image
IP tracing
End Process
Malicious Node Identified
Hash
Function
Match with
original
hash
YesNo
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
194
The user regenerates the hash value from the received image
after successfully decrypting it and compares it with the original
hash value. If they match, the content is considered as authentic.
Otherwise the received image is identified as a fake one.
2.3 Hamming Distance Matching
Distance between hashes of an image pair is used as a metric
for finding similarity or dissimilarity of the two images. The hash
sequence of a received image needs to be tested with the
decrypted hash sequence under similarity ratio. If the difference is
above the threshold then it has been maliciously tampered else it
is considered as legitimate image.
2.4 IP Tracing
Tracer routing is used to find out the unauthorized router or
the system that purposefully modified the content of the image
and forwarded it to the destination in a routing process. This can
be done by getting acknowledgment from every router in the
routing process by a source. Then source compares the
acknowledgement with the predefined routing table for any
routing delay or IP mismatch. Thus the attacker node can be
identified and reported.
3 DISCUSSION AND CONCLUSION
The proposed image hashing approach is developed using
both global and local features. Image hashes produced with the
proposed method are robust against common image processing
operations like brightness adjustment, rescaling and addition of
noise. The IP tracing mechanism helps to find the malicious node
thus providing a full fledged authentication mechanism.
REFERENCES
[1] Robust Hashing for Image Authentication Using Zernike
Moments and Local Features Yan Zhao, Shuozhong Wang,
Xinpeng Zhang, and Heng Yao, Member, IEEE.
[2] S. Xiang, H. J. Kim, and J. Huang, ―Histogram-based image
hashing scheme robust against geometric deformations,‖ in
Proc. ACM Multimedia and Security Workshop, New York,
2007, pp. 121–128.
[3] V. Monga, A. Banerjee, and B. L. Evans, ―A clustering
based approach to perceptual image hashing,‖ IEEE Trans.
Inf. Forensics Security, vol. 1, no. 1, pp. 68–79, Mar. 2006.
[4] Robust Hashing with Local Models for Approximate
Similarity Search Jingkuan Song, Yi Yang, Xuelong Li,
Fellow, IEEE, Zi Huang, and Yang Yang
[5] Bohm C., Berchtold S., and Keim D. A.(2001), ―Searching in
high-dimensional spaces: Index structures for improving the
performance of multimedia databases,‖ ACM Comput.
Survey, vol. 33, no. 3, pp. 322–373.
[6] Cappelli R. (2011), ―Fast and accurate fingerprint indexing
based on ridge orientation and frequency,‖ TSMCB, vol. 41,
no. 6, pp. 1511–1521.
[7] Datar M. and Indyk P. (2004), ―Locality-sensitive hashing
scheme based on p-stable distributions,‖ in Proc. SCG, pp.
253–262.
[8] Datta R., Joshi D., Li J., and Wang J. Z. (2008), ―Image
retrieval: Ideas, influences, and trends of the new age,‖ ACM
Comput. Survey, vol. 40.
[9] Gionis A., Indyk P., and Motwani R. (1999), ―Similarity
search in high dimensions via hashing,‖ in Proc. VLDB, pp.
518–529.
[10] Jagadish H. V., Ooi B. C., Tan K. L., Yu C., and Zhang R.
(2005), ―iDistance: An adaptive B+-tree based indexing
method for nearest neighbor search,‖ ACM TODS, vol. 30,
no. 2, pp. 364–397.
[11] Jingkuan Song, Yi Yang, Xuelong Li, Fellow, IEEE, Zi
Huang, and Yang Yang (2014) "Robust Hashing With Local
Models for Approximate Similarity search" IEEE
transactions on cybernetics, vol. 44, no. 7
[12] Lv Q., Josephson W., Wang Z., Charikar M. and Li
K.(2007), ―Multi-probe LSH: Efficient indexing for high-
dimensional similarity search,‖ in Proc. VLDB, pp. 950–961.
[13] Salakhutdinov R. and Hinton G. E. (2009), ―Semantic
hashing,‖ Int. J. Approx. Reasoning, vol. 50, no. 7, pp. 969–
978.
[14] Shen H. T., Ooi B. C. and Zhou X. (2005), ―Towards
effective indexing for very large video sequence database,‖
in Proc. SIGMOD, pp. 730–741.
[15] Tao Y., Yi K., Sheng C., and Kalnis P. (2010), ―Efficient and
accurate nearest neighbor and closest pair search in high-
dimensional space,‖ ACM TODS, vol. 35, no. 3.
[16] Weiss Y., Torralba A., and Fergus R. (2008), ―Spectral
hashing,‖ in Proc. NIPS, pp. 1753–1760.
[17] Yang Y., Xu D., Nie F., Luo J. and Zhuang Y. (2009),
―Ranking with local regression and global alignment for
cross media retrieval,‖ in Proc. ACM Multimedia, pp. 175–
184.
[18] Zhang D., Wang J., Cai D. and Lu J. (2010), ―Self-taught
hashing for fast similarity search,‖ in SIGIR, pp. 18–25.
[19] Zhang L., Wang L., and Lin W. (2012), ―Generalized biased
discriminant analysis for content-based image retrieval,‖
TSMCB, vol. 42, no. 1, pp. 282–290.

More Related Content

What's hot

Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpegPvrtechnologies Nellore
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELijcsit
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 

What's hot (6)

Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
N010226872
N010226872N010226872
N010226872
 

Similar to Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion

A Review on Matching For Sketch Technique
A Review on Matching For Sketch TechniqueA Review on Matching For Sketch Technique
A Review on Matching For Sketch TechniqueIOSR Journals
 
Strong Image Alignment for Meddling Recognision Purpose
Strong Image Alignment for Meddling Recognision PurposeStrong Image Alignment for Meddling Recognision Purpose
Strong Image Alignment for Meddling Recognision PurposeIJMER
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...IRJET Journal
 
IRJET - An Enhanced Approach for Extraction of Text from an Image using Fuzzy...
IRJET - An Enhanced Approach for Extraction of Text from an Image using Fuzzy...IRJET - An Enhanced Approach for Extraction of Text from an Image using Fuzzy...
IRJET - An Enhanced Approach for Extraction of Text from an Image using Fuzzy...IRJET Journal
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementIRJET Journal
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...IRJET Journal
 
Ijarcet vol-2-issue-3-1078-1080
Ijarcet vol-2-issue-3-1078-1080Ijarcet vol-2-issue-3-1078-1080
Ijarcet vol-2-issue-3-1078-1080Editor IJARCET
 
Dc31472476
Dc31472476Dc31472476
Dc31472476IJMER
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Imagesiosrjce
 
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEYAPPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEYcscpconf
 
Applications of spatial features in cbir a survey
Applications of spatial features in cbir  a surveyApplications of spatial features in cbir  a survey
Applications of spatial features in cbir a surveycsandit
 
Conference research paper_target_tracking
Conference research paper_target_trackingConference research paper_target_tracking
Conference research paper_target_trackingpatrobadri
 
10.1.1.432.9149.pdf
10.1.1.432.9149.pdf10.1.1.432.9149.pdf
10.1.1.432.9149.pdfmoemi1
 
https://uii.io/0hIB
https://uii.io/0hIBhttps://uii.io/0hIB
https://uii.io/0hIBmoemi1
 
10.1.1.432.9149
10.1.1.432.914910.1.1.432.9149
10.1.1.432.9149moemi1
 
A deep locality-sensitive hashing approach for achieving optimal image retri...
A deep locality-sensitive hashing approach for achieving  optimal image retri...A deep locality-sensitive hashing approach for achieving  optimal image retri...
A deep locality-sensitive hashing approach for achieving optimal image retri...IJECEIAES
 

Similar to Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion (20)

A Review on Matching For Sketch Technique
A Review on Matching For Sketch TechniqueA Review on Matching For Sketch Technique
A Review on Matching For Sketch Technique
 
Strong Image Alignment for Meddling Recognision Purpose
Strong Image Alignment for Meddling Recognision PurposeStrong Image Alignment for Meddling Recognision Purpose
Strong Image Alignment for Meddling Recognision Purpose
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
 
50120130405017 2
50120130405017 250120130405017 2
50120130405017 2
 
IRJET - An Enhanced Approach for Extraction of Text from an Image using Fuzzy...
IRJET - An Enhanced Approach for Extraction of Text from an Image using Fuzzy...IRJET - An Enhanced Approach for Extraction of Text from an Image using Fuzzy...
IRJET - An Enhanced Approach for Extraction of Text from an Image using Fuzzy...
 
Ko3419161921
Ko3419161921Ko3419161921
Ko3419161921
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
 
Ijarcet vol-2-issue-3-1078-1080
Ijarcet vol-2-issue-3-1078-1080Ijarcet vol-2-issue-3-1078-1080
Ijarcet vol-2-issue-3-1078-1080
 
Dc31472476
Dc31472476Dc31472476
Dc31472476
 
G010245056
G010245056G010245056
G010245056
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
 
F017374752
F017374752F017374752
F017374752
 
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEYAPPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEY
 
Applications of spatial features in cbir a survey
Applications of spatial features in cbir  a surveyApplications of spatial features in cbir  a survey
Applications of spatial features in cbir a survey
 
Conference research paper_target_tracking
Conference research paper_target_trackingConference research paper_target_tracking
Conference research paper_target_tracking
 
10.1.1.432.9149.pdf
10.1.1.432.9149.pdf10.1.1.432.9149.pdf
10.1.1.432.9149.pdf
 
https://uii.io/0hIB
https://uii.io/0hIBhttps://uii.io/0hIB
https://uii.io/0hIB
 
10.1.1.432.9149
10.1.1.432.914910.1.1.432.9149
10.1.1.432.9149
 
A deep locality-sensitive hashing approach for achieving optimal image retri...
A deep locality-sensitive hashing approach for achieving  optimal image retri...A deep locality-sensitive hashing approach for achieving  optimal image retri...
A deep locality-sensitive hashing approach for achieving optimal image retri...
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Recently uploaded

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 192 Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion G. Mathumitha PG Scholar, Department of CSE, Paavai College of Engineering, Namakkal, India. R. Murugesan Assistant Professor, Department of CSE, Paavai College of Engineering, Namakkal, India. Abstract—Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims at finding the originality of an image. Due to the advent of many image editing software image tampering has become common. The Enhanced hashing approach is suggested for image authentication. The concept of Hashing has been used for searching images from large databases. It can also be applied to image authentication as it produces different results with respect to the change in image. But the hashing methods used for similarity searches cannot be used for image authentication since they are no sensitive for small changes. Moreover, we need a system that detects only perceptual changes. A new hashing method, namely, enhanced robust hashing is proposed for image authentication, which uses global and local properties of an image. This method is developed for detecting image forgery, including removal, insertion, and replacement of objects, and abnormal color modification, and for locating the forged area. The local models include position and texture information of object regions in the image. The hash mechanism uses secret keys for encryption and decryption. IP tracing is done to track the suspicious nodes. Index Terms—Image forgery, image hashing, global and local properties, perceptual hashing, image authentication ——————————  —————————— 1 INTRODUCTION Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against security attacks. Hence, image authentication has become a mandatory process in image sharing. An image hash function maps an image to a short binary string based on the image's appearance to the human eye. With advancement in technology, there are many multimedia data available over the internet. As storage becomes less costly, all the data are stored in database as blob objects. One primitive way for dealing with massive multimedia databases is the similarity search problem. It aims to retrieve similar objects to the query object from the database. Particularly, similarity search is at the heart of many multimedia applications, such as image retrieval, video recommendation, event detection, and face recognition. To improve the performance of similarity search, a long stream of research efforts has been made in the database community. Because of the difference in dimensionality it is difficult to find the exact image using similarity search. To address this issue approximate similarity search has been implemented in recent years, which brings related images as a result instead of exact images for the given query. With the advent of many image editing software and its widespread use, image authentication becomes important to avoid image forgery. Hashing can be efficiently used to authenticate an image since a small change in the image will produce a different hash code when the same hash function is used. In general, a hash should be short, robust against simple image modifications and sensitive against major modifications. Therefore the objective is to provide a reasonably short hash code for an image with good performance. Global moments of the luminance and chrominance components are used to reflect the image’s global characteristics, and extract local texture features from salient regions in the image to represent the contents in the corresponding areas. 2 PROPOSED IMAGE AUTHENTICATION PROTOCOL Many previous schemes are either based on global or local features. Global features are generally short but insensitive to changes of small areas in the image, while local features can reflect regional modifications but usually produce longer hashes. Therefore, a method that generates reasonably short hash code and better reflects the properties of an image is required. The proposed work focuses on efficient and automatic techniques to
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 193 identify and verify the contents of digital images. The services provided by the proposed image authentication system are mentioned below. 1. Identify the received image as a similar image, or a tampered image, or a different image. 2. Evaluate similarity of two images by calculating the distance between them. 3. Identify and locate three types of tampered area: Added area, Removed area, Changed area. 4. Estimate the percentage of tampered area. Fig. 1. Process steps for image authentication. When an image is sent to the user, a possible solution to prove authenticity is to generate a hash value and send it securely to the user. The hash value is a compact string. It can be called as an abstract of the content. A user can regenerate hash value from the received image, and compare it with the original hash value. If they match, the content is considered as authentic. In order to allow incidental distortion, the hash value must possess some robustness. In [1], the authors generated image hash using Zernike Moments and local features. But the Salient region is detected as rectangular boxes which include some background details and does not clearly show the salient region. In order identify the salient region edge detection mechanism is used in the proposed work. And also IP tracing is enabled in the proposed system to find the malicious node where the image got tampered. Fig.3 explains the process steps of the proposed image authentication protocol. The image is first rescaled to a fixed size and converted from RGB to grayscale. These steps are covered under the preprocessing step. The aim of rescaling is to ensure that the generated image hash has a fixed length and the same computation complexity. Next global and local features are extracted. Then the Global and local features are concatenated to construct a final hash value. 2.1 Edge Detection Mechanisms Our proposed work includes research on the embedding algorithm robust to geometric distortions and improving the precision in locating the altered areas by implementing via any digital multimedia networking application for verifying the content of image transmission over RGB features. So this kind of implementation is desired to find features that best represent the image contents so as to enhance the hash’s sensitivity to small area tampering while maintaining short hash length, good robustness against normal image processing like edge detection mechanisms and include tracer routing to detect the content modified hacker system which is use full to reduce the hacking possibilities. So without knowledge of this method, hacker information may be acknowledged to the sender once the hacker receives the packet for content or object modifications. Fig. 2. Salient feature identification using Edge detection. Here, in the final image salient features are highlighted. Instead of rectangular boxes only the edges were traced thus giving only the salient feature. Hash can be constructed for the detected regions and transmitted along with the original image to the receiver. 2.2 Hashing Generation and Encryption The global and object local vectors are concatenated to form an intermediate hash, which is then pseudo-randomly scrambled based on a secret key to produce the final hash sequence. Advanced encryption algorithms are used to encrypt the hash sequence with respect to secret keys. Received Image Preprocessing Edge detection Hash construction Fake image Original Image IP tracing End Process Malicious Node Identified Hash Function Match with original hash YesNo
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 194 The user regenerates the hash value from the received image after successfully decrypting it and compares it with the original hash value. If they match, the content is considered as authentic. Otherwise the received image is identified as a fake one. 2.3 Hamming Distance Matching Distance between hashes of an image pair is used as a metric for finding similarity or dissimilarity of the two images. The hash sequence of a received image needs to be tested with the decrypted hash sequence under similarity ratio. If the difference is above the threshold then it has been maliciously tampered else it is considered as legitimate image. 2.4 IP Tracing Tracer routing is used to find out the unauthorized router or the system that purposefully modified the content of the image and forwarded it to the destination in a routing process. This can be done by getting acknowledgment from every router in the routing process by a source. Then source compares the acknowledgement with the predefined routing table for any routing delay or IP mismatch. Thus the attacker node can be identified and reported. 3 DISCUSSION AND CONCLUSION The proposed image hashing approach is developed using both global and local features. Image hashes produced with the proposed method are robust against common image processing operations like brightness adjustment, rescaling and addition of noise. The IP tracing mechanism helps to find the malicious node thus providing a full fledged authentication mechanism. REFERENCES [1] Robust Hashing for Image Authentication Using Zernike Moments and Local Features Yan Zhao, Shuozhong Wang, Xinpeng Zhang, and Heng Yao, Member, IEEE. [2] S. Xiang, H. J. Kim, and J. Huang, ―Histogram-based image hashing scheme robust against geometric deformations,‖ in Proc. ACM Multimedia and Security Workshop, New York, 2007, pp. 121–128. [3] V. Monga, A. Banerjee, and B. L. Evans, ―A clustering based approach to perceptual image hashing,‖ IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 68–79, Mar. 2006. [4] Robust Hashing with Local Models for Approximate Similarity Search Jingkuan Song, Yi Yang, Xuelong Li, Fellow, IEEE, Zi Huang, and Yang Yang [5] Bohm C., Berchtold S., and Keim D. A.(2001), ―Searching in high-dimensional spaces: Index structures for improving the performance of multimedia databases,‖ ACM Comput. Survey, vol. 33, no. 3, pp. 322–373. [6] Cappelli R. (2011), ―Fast and accurate fingerprint indexing based on ridge orientation and frequency,‖ TSMCB, vol. 41, no. 6, pp. 1511–1521. [7] Datar M. and Indyk P. (2004), ―Locality-sensitive hashing scheme based on p-stable distributions,‖ in Proc. SCG, pp. 253–262. [8] Datta R., Joshi D., Li J., and Wang J. Z. (2008), ―Image retrieval: Ideas, influences, and trends of the new age,‖ ACM Comput. Survey, vol. 40. [9] Gionis A., Indyk P., and Motwani R. (1999), ―Similarity search in high dimensions via hashing,‖ in Proc. VLDB, pp. 518–529. [10] Jagadish H. V., Ooi B. C., Tan K. L., Yu C., and Zhang R. (2005), ―iDistance: An adaptive B+-tree based indexing method for nearest neighbor search,‖ ACM TODS, vol. 30, no. 2, pp. 364–397. [11] Jingkuan Song, Yi Yang, Xuelong Li, Fellow, IEEE, Zi Huang, and Yang Yang (2014) "Robust Hashing With Local Models for Approximate Similarity search" IEEE transactions on cybernetics, vol. 44, no. 7 [12] Lv Q., Josephson W., Wang Z., Charikar M. and Li K.(2007), ―Multi-probe LSH: Efficient indexing for high- dimensional similarity search,‖ in Proc. VLDB, pp. 950–961. [13] Salakhutdinov R. and Hinton G. E. (2009), ―Semantic hashing,‖ Int. J. Approx. Reasoning, vol. 50, no. 7, pp. 969– 978. [14] Shen H. T., Ooi B. C. and Zhou X. (2005), ―Towards effective indexing for very large video sequence database,‖ in Proc. SIGMOD, pp. 730–741. [15] Tao Y., Yi K., Sheng C., and Kalnis P. (2010), ―Efficient and accurate nearest neighbor and closest pair search in high- dimensional space,‖ ACM TODS, vol. 35, no. 3. [16] Weiss Y., Torralba A., and Fergus R. (2008), ―Spectral hashing,‖ in Proc. NIPS, pp. 1753–1760. [17] Yang Y., Xu D., Nie F., Luo J. and Zhuang Y. (2009), ―Ranking with local regression and global alignment for cross media retrieval,‖ in Proc. ACM Multimedia, pp. 175– 184. [18] Zhang D., Wang J., Cai D. and Lu J. (2010), ―Self-taught hashing for fast similarity search,‖ in SIGIR, pp. 18–25. [19] Zhang L., Wang L., and Lin W. (2012), ―Generalized biased discriminant analysis for content-based image retrieval,‖ TSMCB, vol. 42, no. 1, pp. 282–290.