{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T00:41:22Z","timestamp":1760402482977,"version":"build-2065373602"},"reference-count":47,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2020,4,18]],"date-time":"2020-04-18T00:00:00Z","timestamp":1587168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJGI"],"abstract":"<jats:p>Content integrity of high-resolution remote sensing (HRRS) images is the premise of its usability. Existing HRRS image integrity authentication methods are mostly binary decision-making processes, which cannot provide a further interpretable information (e.g., tamper localization, tamper type determination). Due to this reason, a robust HRRS images integrity authentication algorithm using perceptual hashing technology considering both global and local features is proposed in this paper. It extracts global features by the efficient recognition ability of Zernike moments to texture information. Meanwhile, Features from Accelerated Segment Test (FAST) key points are applied to local features construction and tamper localization. By applying the concept of multi-feature combination to the integrity authentication of HRRS images, the authentication process is more convincing in comparison to existing algorithms. Furthermore, an interpretable authentication result can be given. The experimental results show that the algorithm proposed in this paper is highly robust to the content retention operation, has a strong sensitivity to the content changing operations, and the result of tampering localization is more precise comparing with existing algorithms.<\/jats:p>","DOI":"10.3390\/ijgi9040254","type":"journal-article","created":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T03:23:06Z","timestamp":1587439386000},"page":"254","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["High-Resolution Remote Sensing Image Integrity Authentication Method Considering Both Global and Local Features"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3016-9635","authenticated-orcid":false,"given":"Xingang","family":"Zhang","sequence":"first","affiliation":[{"name":"Faculty of Geomatics, Lanzhou Jiaotong University, Lanzhou 730070, China"},{"name":"National-Local Joint Engineering Research Center of Technologies and Applications for National Geographic State Monitoring, Lanzhou 730070, China"},{"name":"Gansu Provincial Engineering Laboratory for National Geographic State Monitoring, Lanzhou 730070, China"}]},{"given":"Haowen","family":"Yan","sequence":"additional","affiliation":[{"name":"Faculty of Geomatics, Lanzhou Jiaotong University, Lanzhou 730070, China"},{"name":"National-Local Joint Engineering Research Center of Technologies and Applications for National Geographic State Monitoring, Lanzhou 730070, China"},{"name":"Gansu Provincial Engineering Laboratory for National Geographic State Monitoring, Lanzhou 730070, China"}]},{"given":"Liming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Faculty of Geomatics, Lanzhou Jiaotong University, Lanzhou 730070, China"},{"name":"National-Local Joint Engineering Research Center of Technologies and Applications for National Geographic State Monitoring, Lanzhou 730070, China"},{"name":"Gansu Provincial Engineering Laboratory for National Geographic State Monitoring, Lanzhou 730070, China"}]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"Faculty of Geomatics, Lanzhou Jiaotong University, Lanzhou 730070, China"},{"name":"National-Local Joint Engineering Research Center of Technologies and Applications for National Geographic State Monitoring, Lanzhou 730070, China"},{"name":"Gansu Provincial Engineering Laboratory for National Geographic State Monitoring, Lanzhou 730070, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,4,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"4867","DOI":"10.1016\/j.atmosenv.2010.08.033","article-title":"A study of extractive and remote-sensing sampling and measurement of emissions from military aircraft engines","volume":"44","author":"Edwin","year":"2010","journal-title":"Atmos. Environ."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.rse.2003.04.006","article-title":"Extending satellite remote sensing to local scales: Land and water resource monitoring using high-resolution imagery","volume":"88","author":"Sawaya","year":"2003","journal-title":"Remote Sens. Environ."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1142\/S1793431107000122","article-title":"Remote sensing technologies in post-disaster damage assessment","volume":"1","author":"Yamazaki","year":"2007","journal-title":"J. Earthq. Tsunami"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Bio, A., Gon\u00e7alves, J.A., Magalh\u00e3es, A., Pinheiro, J., and Bastos, L. (2020). Combining Low-Cost Sonar and High-Precision Global Navigation Satellite System for Shallow Water Bathymetry. Estuaries Coasts, 1\u201312.","DOI":"10.1007\/s12237-020-00703-6"},{"key":"ref_5","unstructured":"Ding, K. (2013). Perceptual Hashing Based Authentication Algorithm Research for Remote Sensing Image. [Ph.D. Thesis, Nanjing Normal University]."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Hambouz, A., Shaheen, Y., Manna, A., Al-Fayoumi, M., and Tedmori, S. (2019, January 9\u201311). Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques. Proceedings of the 2nd International Conference on new Trends in Computing Sciences (ICTCS), Amman, Jordan.","DOI":"10.1109\/ICTCS.2019.8923060"},{"key":"ref_7","unstructured":"Iqbal, S. (2019). Digital Signature Based on Matrix Power Function. [Ph.D. Thesis, Capital University]."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Mohanarathinam, A., Kamalraj, S., Venkatesan, G.P., Ravi, R.V., and Manikandababu, C.S. (2019). Digital watermarking techniques for image security: A review. J. Ambient Intell. Humaniz. Comput., 1\u20139.","DOI":"10.1007\/s12652-019-01500-1"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"115713","DOI":"10.1016\/j.image.2019.115713","article-title":"Perceptual hashing for image authentication: A survey","volume":"81","author":"Du","year":"2020","journal-title":"Signal Process. Image Commun."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Long, S. (2019). A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512. J. Phys. Conf. Ser., 1314.","DOI":"10.1088\/1742-6596\/1314\/1\/012210"},{"key":"ref_11","first-page":"97","article-title":"Remote sensing image anti-modification in land consolidation based on XOR LSB algorithm","volume":"24","author":"Li","year":"2008","journal-title":"Trans. Case"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"5583","DOI":"10.1080\/01431161.2010.507256","article-title":"A novel semi-fragile forensic watermarking scheme for remote sensing images","volume":"32","year":"2011","journal-title":"Int. J. Remote Sens."},{"key":"ref_13","unstructured":"Zhang, X. (2014). Research on Integrity Authentication Algorithm of Remote Sensing Image Based on Fragile Watermarking. [Master\u2019s Thesis, Nanjing Normal University]."},{"key":"ref_14","first-page":"2542","article-title":"Research of digital semi-fragile watermarking of remote sensing image based on wavelet analysis","volume":"Volume 4","author":"Qin","year":"2004","journal-title":"Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium (IGARSS)"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Serra-Ruiz, J., and Meg\u00edas, D. (2010, January 14\u201317). DWT and TSVQ-based semi-fragile watermarking scheme for tampering detection in remote sensing images. Proceedings of the 2010 Fourth Pacific-Rim Symposium on Image and Video Technology, Washington, DC, USA.","DOI":"10.1109\/PSIVT.2010.62"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"16053","DOI":"10.1007\/s11042-018-7014-1","article-title":"Secure and robust watermarking algorithm for remote sensing images based on compressive sensing","volume":"78","author":"Tong","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","first-page":"1405","article-title":"An overview of perceptual hashing","volume":"36","author":"Niu","year":"2008","journal-title":"Acta Electron. Sin."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Sarohi, H.K., and Khan, F.U. (2013). Image retrieval using perceptual hashing. IOSR-JCE, 9.","DOI":"10.9790\/0661-0913840"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"814","DOI":"10.9790\/3021-0204814818","article-title":"Content-based medical image annotation and retrieval using perceptual hashing algorithm","volume":"2","author":"Nagarajan","year":"2012","journal-title":"IOSR J. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"703","DOI":"10.2298\/CSIS170112024H","article-title":"A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing","volume":"14","author":"He","year":"2017","journal-title":"Comput. Sci. Inf. Syst."},{"key":"ref_21","first-page":"311","article-title":"An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition","volume":"6","author":"Zhang","year":"2015","journal-title":"J. Inf. Hiding Multimed. Signal Proc."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"791814","DOI":"10.1155\/2013\/791814","article-title":"Perceptual hashing-based robust image authentication scheme for wireless multimedia sensor networks","volume":"9","author":"Wang","year":"2013","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Renza, D., Vargas, J., and Ballesteros, D.M. (2020). Robust Speech Hashing for Digital Audio Forensics. Appl. Sci., 10.","DOI":"10.3390\/app10010249"},{"key":"ref_24","first-page":"3","article-title":"A Review of Hashing based Image Copy Detection Techniques","volume":"19","author":"Srivastava","year":"2019","journal-title":"Cybernet. Inf. Tech."},{"key":"ref_25","first-page":"1","article-title":"Efficient Image Hashing with Geometric Invariant Vector Distance for Copy Detection","volume":"15","author":"Liu","year":"2019","journal-title":"ACM Trans. Multim. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Liu, C., Ma, J., Tang, X., Zhang, X., and Jiao, L. (August, January 28). Adversarial Hash-Code Learning for Remote Sensing Image Retrieval. Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Yokohama, Japan.","DOI":"10.1109\/IGARSS.2019.8900431"},{"key":"ref_27","first-page":"70","article-title":"A Perceptual Hash Algorithm Based on Gabor Filter Bank and DWT for Remote Sensing Image Authenticaton","volume":"7","author":"Ding","year":"2016","journal-title":"J. Chi. Rail Soci."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Ding, K., Meng, F., Liu, Y., Xu, N., and Chen, W. (2019). Perceptual Hashing Based Forensics Scheme for the Integrity Authentication of High-Resolution Remote Sensing Image. Information, 9.","DOI":"10.3390\/info9090229"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ding, K., Yang, Z., Wang, Y., and Liu, Y. (2019). An improved perceptual hash algorithm based on u-net for the authentication of high-resolution remote sensing image. Appl. Sci., 9.","DOI":"10.3390\/app9152972"},{"key":"ref_30","first-page":"117","article-title":"Robust audio hashing for content identification","volume":"Volume 4","author":"Haitsma","year":"2001","journal-title":"International Workshop on Content-Based Multimedia Indexing"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2609","DOI":"10.1007\/s11042-015-3225-x","article-title":"Robust hashing for image authentication using SIFT feature and quaternion Zernike moments","volume":"76","author":"Ouyang","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.cose.2011.11.004","article-title":"A robust hashing algorithm based on SURF for video copy detection","volume":"31","author":"Yang","year":"2012","journal-title":"Comput. Secur."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Sengar, S.S., and Mukhopadhyay, S. (2016, January 23\u201325). Moving object tracking using Laplacian-DCT based perceptual hash. Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India.","DOI":"10.1109\/WiSPNET.2016.7566561"},{"key":"ref_34","first-page":"3734","article-title":"DCT and perceptual hashing based to identify texture anti-counterfeiting tag","volume":"31","author":"Li","year":"2014","journal-title":"Appl. Res. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1109\/TIT.1962.1057692","article-title":"Visual pattern recognition by moment invariants","volume":"8","author":"Hu","year":"1962","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Govindaraj, P., and Sandeep, R. (2015, January 2\u20134). Ring partition and dwt based perceptual image hashing with application to indexing and retrieval of near-identical images. Proceedings of the 2015 Fifth International Conference on Advances in Computing and Communications (ICACC), Manipal, Karnataka, India.","DOI":"10.1109\/ICACC.2015.90"},{"key":"ref_37","first-page":"717","article-title":"A robust image hashing method based on Zernike moments","volume":"6","author":"Zhao","year":"2010","journal-title":"J. Comput. Inf. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/34.55109","article-title":"Invariant image recognition by Zernike moments","volume":"12","author":"Khotanzad","year":"1990","journal-title":"IEEE Trans Pattern Anal."},{"key":"ref_39","first-page":"10","article-title":"A combined corner and edge detector","volume":"Volume 15","author":"Harris","year":"1988","journal-title":"Proceedings of the 4th Alvey Vision Conference"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","article-title":"Distinctive image features from scale-invariant keypoints","volume":"60","author":"Lowe","year":"2004","journal-title":"Int. J. Comput. Vis."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","article-title":"Speeded-up robust features (SURF)","volume":"110","author":"Bay","year":"2008","journal-title":"Comput. Vis. Image Underst."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Rosten, E., and Tom, D. (2006). Machine learning for high-speed corner detection. European Conference on Computer Vision, Springer.","DOI":"10.1007\/11744023_34"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1145\/359423.359432","article-title":"A linear algorithm for incremental digital display of circular arcs","volume":"20","author":"Bresenham","year":"1977","journal-title":"Commun. ACM"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/TIFS.2012.2223680","article-title":"Robust hashing for image authentication using Zernike moments and local features","volume":"8","author":"Zhao","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1111\/j.2044-8317.1974.tb00528.x","article-title":"The logistic transformation in the analysis of paired-comparison data","volume":"27","author":"Maxwell","year":"1974","journal-title":"Brit. J. Math. Stat. Psychol."},{"key":"ref_46","first-page":"331","article-title":"Fast approximate nearest neighbors with automatic algorithm configuration","volume":"2","author":"Muja","year":"2009","journal-title":"VISAPP"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Xia, G.S., Bai, X., Ding, J., Zhu, Z., Belongie, S., Luo, J., and Zhang, L. (2018, January 18\u201322). DOTA: A large-scale dataset for object detection in aerial images. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00418"}],"container-title":["ISPRS International Journal of Geo-Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2220-9964\/9\/4\/254\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:45:05Z","timestamp":1760363105000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2220-9964\/9\/4\/254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,18]]},"references-count":47,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,4]]}},"alternative-id":["ijgi9040254"],"URL":"https:\/\/doi.org\/10.3390\/ijgi9040254","relation":{},"ISSN":["2220-9964"],"issn-type":[{"type":"electronic","value":"2220-9964"}],"subject":[],"published":{"date-parts":[[2020,4,18]]}}}