Bulletin of Surveying and Mapping ›› 2020, Vol. 0 ›› Issue (8): 44-49.doi: 10.13474/j.cnki.11-2246.2020.0246

Previous Articles     Next Articles

Perceptual Hash algorithm for GF-2 image using SIFT and SVD

WANG Hao1,2,3, ZHANG Liming1,2,3,4, MU Haowei1,2,3, ZHANG Xingang1,2,3, CHEN Jinping1,2,3   

  1. 1. Faculty of Geomatics, Lanzhou Jiaotong University, Lanzhou 730070, China;
    2. National-Local Joint Engineering Research Center of Technologies and Applications for National Geographic State Monitoring, Lanzhou 730070, China;
    3. Gansu Provincial Engineering Laboratory for National Geographic State Monitoring, Lanzhou 730070, China;
    4. Yangzhou Micro Map Geographic Information Technology Co., Ltd., Yangzhou 225002, China
  • Received:2019-11-12 Published:2020-09-01

Abstract: A perceptual Hash algorithm for the GF-2 image is proposed to solve the problem of the local tampering in the transmission, storage and use of the GF-2 image. Firstly, the entire image is divided into multiple sub-blocks by means of fixed partitioning. SIFT operator is used to extract the feature information of key points in sub-blocks. Then, SIFT key feature information is extracted via SVD and the first 10% of them is chosen to construct the perceptual hash of sub-blocks. Finally, the perceptual Hash sequence of all sub-blocks is concatenated to generate the perceptual hash sequence of the whole image. In the process of image authentication, the difference between the original GF-2 image and the image to be authenticated is used for authentication of the content. In the meantime, the algorithm has realized detection and location of the object tampering in the GF-2 image. Experiments show that the algorithm is robust at the operation of LSB watermark embedding, DAT format conversion and BMP format conversion. In a word, the proposed algorithm can improved security for the use of the GF-2 image.

Key words: SIFT, SVD, GF-2 image, perceptual Hash algorithm, content authentication

CLC Number: