Digital watermarking
New Iterative Geometric Methods for Robust Perceptual Image Hashing
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Geometric distortion-resilient image hashing system and its application scalability
Proceedings of the 2004 workshop on Multimedia and security
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking
ICMCS '99 Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems - Volume 02
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Fault resilient and compression tolerant digital signature for image authentication
IEEE Transactions on Consumer Electronics
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Secure and incidental distortion tolerant digital signature for image authentication
Journal of Computer Science and Technology
Image forensic signature for content authenticity analysis
Journal of Visual Communication and Image Representation
Hi-index | 0.00 |
Image hashing is an alternative approach to many applications accomplished with watermarking. In this paper, we propose a novel image hashing method in the DCT Domain which can be directly extended to MPEG video without DCT transforms. A key goal of the method is to produce randomized hash signatures which are unpredictable for unauthorized users, thereby yielding properties akin to cryptographic MACs. This is achieved by encryption of the block DCT coefficients with chaotic sequences. After applying Principal Components Analysis (PCA) to the encrypted DCT coefficients, we take the quantized eigenvector matrix (8 × 8) and 8 eigenvalues together as the hash signature, the length of which is only 72 bytes for any image of arbitrary size. For image authentication, we also present an algorithm for locating tampering based on the hashing method. Experiments on large-scale database show that the proposed method is efficient, key dependent, pairwise independence, robust against common content-preserving manipulations.