Embedded hash codes for image similarity detection and tamper proofing

Sajid Nazir, Mohammad Kaleem

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
112 Downloads (Pure)

Abstract

The image and video traffic on the Internet has increased due to the ease and abundance of the image capture and sharing services. However, this can sometimes result in violations of copyright and image tampering for various purposes. Finding differences between images has importance for image retrieval, aiding forensics, disease diagnosis, and environmental changes etc. Many similarity measures have been proposed that use different features extractable from the detected image. In some cases it is important to determine if the set of images differ and if so then to what extent. Digital Rights Management (DRM) has gained prominence and importance due to widespread availability of tools to modify images. Sometimes the need arises to claim the rightful ownership of an image. The blockchain through the use of hash codes can be used to determine tampering similar to its success in many industries where privacy and security of the documents is important.
In this paper we embed the image hash code in the JPEG image header. The proposed system simplifies the hashing and encryption process by processing only the image data without which a reconstruction is not possible. The results show that the image data can thus be shared without the risk of any undetected tampering or misuse.
Original languageEnglish
Title of host publication2022 International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering (ETECTE)
PublisherIEEE
ISBN (Electronic)9781665492423
ISBN (Print)9781665492430
DOIs
Publication statusE-pub ahead of print - 10 Jan 2023
EventInternational Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering - Lahore, Pakistan
Duration: 2 Dec 20224 Feb 2023

Publication series

Name
ISSN (Print)None

Conference

ConferenceInternational Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering
Abbreviated titleETECTE
Country/TerritoryPakistan
CityLahore
Period2/12/224/02/23

Keywords

  • digital rights management, JPEG, tamper-proofing, encryption, image similarity, blockchain
  • tamper-proofing
  • encryption
  • blockchain
  • image similarity
  • JPEG

ASJC Scopus subject areas

  • Artificial Intelligence
  • Control and Optimization
  • Electrical and Electronic Engineering
  • Control and Systems Engineering
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Embedded hash codes for image similarity detection and tamper proofing'. Together they form a unique fingerprint.

Cite this