Efficient generation of the binary reflected gray code and its applications
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Representations for Genetic and Evolutionary Algorithms
Representations for Genetic and Evolutionary Algorithms
Geometric Hashing: An Overview
IEEE Computational Science & Engineering
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
New Iterative Geometric Methods for Robust Perceptual Image Hashing
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Perceptual audio hashing functions
EURASIP Journal on Applied Signal Processing
A decision theoretic framework for analyzing binary hash-based content identification systems
Proceedings of the 8th ACM workshop on Digital rights management
A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing
SSP '07 Proceedings of the 2007 IEEE/SP 14th Workshop on Statistical Signal Processing
A novel image hash algorithm resistant to print-scan
Signal Processing
A study on the randomness measure of image hashing
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Fragility analysis of adaptive quantization-based image hashing
IEEE Transactions on Information Forensics and Security
Perceptual image hashing based on virtual watermark detection
IEEE Transactions on Image Processing
Robust video hashing based on radial projections of key frames
IEEE Transactions on Signal Processing - Part II
Unicity Distance of Robust Image Hashing
IEEE Transactions on Information Forensics and Security - Part 1
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations
IEEE Transactions on Information Forensics and Security - Part 1
A clustering based approach to perceptual image hashing
IEEE Transactions on Information Forensics and Security
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.08 |
The discrete-binary conversion stage, which plays the role of converting quantized hash vectors into binary hash strings by encoding, is one of the most important parts of authentication-oriented image hashing. However, very few works have been done on the discrete-binary conversion stage. In this paper, based on Gray code, we propose a key-dependent code called random Gray (RGray) code for image hashing, which, according to our theoretical analysis and experimental results, is likely to increase the security of image hashing to some extent and meanwhile maintains the performance of Gray code in terms of the tradeoff between robustness and fragility. We also apply a measure called distance distortion, which was proposed by Rothlauf (2002) [1] for evolutionary search, to investigate the influence of the discrete-binary conversion stage on the performance of image hashing. Based on distance distortion, we present a theoretical comparison of the encodings applied in the discrete-binary conversion stage of image hashing, including RGray encoding. And our experimental results validate the practical applicability of distance distortion on the performance evaluation of the discrete-binary conversion stage.