A study on the use of perceptual hashing to detect manipulation of embedded messages in images

02/28/2023
by   Sven-Jannik Wöhnert, et al.
0

Typically, metadata of images are stored in a specific data segment of the image file. However, to securely detect changes, data can also be embedded within images. This follows the goal to invisibly and robustly embed as much information as possible to, ideally, even survive compression. This work searches for embedding principles which allow to distinguish between unintended changes by lossy image compression and malicious manipulation of the embedded message based on the change of its perceptual or robust hash. Different embedding and compression algorithms are compared. The study shows that embedding a message via integer wavelet transform and compression with Karhunen-Loeve-transform yields the best results. However, it was not possible to distinguish between manipulation and compression in all cases.

READ FULL TEXT
research
11/12/2021

Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash

Apple recently revealed its deep perceptual hashing system NeuralHash to...
research
02/02/2021

Fake-image detection with Robust Hashing

In this paper, we investigate whether robust hashing has a possibility t...
research
12/03/2009

Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

In this paper, a new reversible image authentication technique with tamp...
research
11/23/2012

A Hash based Approach for Secure Keyless Steganography in Lossless RGB Images

This paper proposes an improved steganography approach for hiding text m...
research
04/24/2013

k-Modulus Method for Image Transformation

In this paper, we propose a new algorithm to make a novel spatial image ...
research
09/02/2020

Embedded Blockchains: A Synthesis of Blockchains, Spread Spectrum Watermarking, Perceptual Hashing Digital Signatures

In this paper we introduce a scheme for detecting manipulated audio and ...
research
01/18/2016

Multiple Watermarking Algorithm Based on Spread Transform Dither Modulation

Multiple watermarking technique, embedding several watermarks in one car...

Please sign up or login with your details

Forgot password? Click here to reset