JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
Perceptual audio hashing functions
EURASIP Journal on Applied Signal Processing
Security enhancement of visual hashes through key dependent wavelet transformations
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs
IEEE Transactions on Image Processing
Key-dependent JPEG2000-based robust hashing for secure image authentication
EURASIP Journal on Information Security
Hi-index | 0.00 |
We discuss a JPEG2000 packet data based hashing scheme for robust image authentication. Motivated by attacks against the approach, key-dependency is added by means of employing a randomized wavelet packet scheme in the wavelet decomposition stage. Attacks can be prevented effectively employing key dependency but the parameters required for this approach lead to decreased compression robustness which has to be compensated by an decrease of the hash length (which of course reduces security).