Evaluating Perceptual Hashing Algorithms in Detecting Image Manipulation Over Social Media Platforms

Mohammed Alkhowaiter, Khalid Almubarak, Cliff Zou

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Perceptual hash is a fingerprint of features of multimedia content. Compared with crypto hash, perceptual hash shows many advantages when defending against image-based fake news attacks in terms of detecting deliberate image manipulation while still tolerating normal format or resolution changes conducted on user-uploaded images by content-hosting providers such as social media platforms. Previous research into perceptual hash has studied general image manipulation without considering legitimate image transformation by social media platforms. This paper evaluates and analyzes six state-of-the-art perceptual hash algorithms for detecting image manipulation over two major social media platforms: Facebook and Twitter. Our real-world image evaluation shows differences in the two platforms' image processing and how the six algorithms perform in detecting image manipulation over these platforms. We also present a new approach to finding the optimal detection threshold for each perceptual hash algorithm in distinguishing the platform's standard image processing from deliberate image manipulation.

Original languageEnglish
Title of host publicationProceedings of the 2022 IEEE International Conference on Cyber Security and Resilience, CSR 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages149-156
Number of pages8
ISBN (Electronic)9781665499521
DOIs
StatePublished - 2022
Externally publishedYes
Event2nd IEEE International Conference on Cyber Security and Resilience, CSR 2022 - Virtual, Online, Greece
Duration: 27 Jul 202229 Jul 2022

Publication series

NameProceedings of the 2022 IEEE International Conference on Cyber Security and Resilience, CSR 2022

Conference

Conference2nd IEEE International Conference on Cyber Security and Resilience, CSR 2022
Country/TerritoryGreece
CityVirtual, Online
Period27/07/2229/07/22

Keywords

  • Computer security
  • Digital forensics
  • Fake news
  • Perceptual hashing
  • Social media

Fingerprint

Dive into the research topics of 'Evaluating Perceptual Hashing Algorithms in Detecting Image Manipulation Over Social Media Platforms'. Together they form a unique fingerprint.

Cite this