Efficient generation of the binary reflected gray code and its applications
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
New Iterative Geometric Methods for Robust Perceptual Image Hashing
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing
SSP '07 Proceedings of the 2007 IEEE/SP 14th Workshop on Statistical Signal Processing
Unicity Distance of Robust Image Hashing
IEEE Transactions on Information Forensics and Security - Part 1
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations
IEEE Transactions on Information Forensics and Security - Part 1
A clustering based approach to perceptual image hashing
IEEE Transactions on Information Forensics and Security
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
A study on the randomness measure of image hashing
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Random Gray code and its performance analysis for image hashing
Signal Processing
Robust image hash in Radon transform domain for authentication
Image Communication
Robust 3D mesh model hashing based on feature object
Digital Signal Processing
Hi-index | 0.00 |
Fragility is one of the most important properties of authentication-oriented image hashing. However, to date, there has been little theoretical analysis on the fragility of image hashing. In this paper,we propose a measure called expected discriminability for the fragility of image hashing and study this fragility theoretically based on the proposed measure. According to our analysis, when Gray code is applied into the discrete-binary conversion stage of image hashing, the value of the expected discriminability, which is dominated by the quantization stage of image hashing, is no more than 1/2. We further evaluate the expected discriminability of the image-hashing scheme that uses adaptive quantization, which is the most popular quantization scheme in the field of image hashing. Our evaluation reveals that if deterministic adaptive quantization is applied, then the expected discriminability of the image-hashing scheme can reach the maximum value (i.e., 1/2). Finally, some experiments are conducted to validate our theoretical analysis and to compare the performance of several quantization schemes for image hashing.