Histogram-based image hashing scheme robust against geometric deformations
Proceedings of the 9th workshop on Multimedia & security
Image authentication using added signal-dependent noise
Research Letters in Signal Processing
Key-dependent JPEG2000-based robust hashing for secure image authentication
EURASIP Journal on Information Security
Information-theoretic hashing of 3D objects using spectral graph theory
Expert Systems with Applications: An International Journal
Unconditionally Secure Approximate Message Authentication
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A novel image hash algorithm resistant to print-scan
Signal Processing
Robust video fingerprinting based on symmetric pairwise boosting
IEEE Transactions on Circuits and Systems for Video Technology
Intrinsic sensor noise features for forensic analysis on scanners and scanned images
IEEE Transactions on Information Forensics and Security
Performance analysis of Fridrich-Goljan self-embedding authentication method
IEEE Transactions on Information Forensics and Security
Speech Hashing Algorithm Based on Short-Time Stability
ICANN '09 Proceedings of the 19th International Conference on Artificial Neural Networks: Part II
Shape-based features for image hashing
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Video fingerprinting based on moment invariants capturing appearance and motion
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
A study on the randomness measure of image hashing
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Quantum hashing for multimedia
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Hash-based identification of sparse image tampering
IEEE Transactions on Image Processing
A secure and robust hash-based scheme for image authentication
Signal Processing
Robust image copy detection using multi-resolution histogram
Proceedings of the international conference on Multimedia information retrieval
Secure client-side ST-DM watermark embedding
IEEE Transactions on Information Forensics and Security
Fragility analysis of adaptive quantization-based image hashing
IEEE Transactions on Information Forensics and Security
A structured approach to detect scanner-printer used in generating fake document
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Content based image hashing via wavelet and radon transform
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
The Martini Synch: joint fuzzy hashing via error correction
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
On hashing with tweakable ciphers
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secure image hashing VIA minimum distortion estimation
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Compressive sensing-based image hashing
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Perceptual image hashing based on virtual watermark detection
IEEE Transactions on Image Processing
JPEG error analysis and its applications to digital image forensics
IEEE Transactions on Information Forensics and Security
Semi-fragile Zernike moment-based image water marking for authentication
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Cryptanalysis on an image scrambling encryption scheme based on pixel bit
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Image distortion estimation by hash comparison
MMM'11 Proceedings of the 17th international conference on Advances in multimedia modeling - Volume Part I
An extended image hashing concept: content-based fingerprinting using FJLT
EURASIP Journal on Information Security
A novel image copy detection scheme based on the local multi-resolution histogram descriptor
Multimedia Tools and Applications
Lexicographical framework for image hashing with implementation based on DCT and NMF
Multimedia Tools and Applications
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection
Fundamenta Informaticae
WAMUS'07 Proceedings of the 7th WSEAS international conference on Wavelet analysis & multirate systems
Random Gray code and its performance analysis for image hashing
Signal Processing
Robust image hash in Radon transform domain for authentication
Image Communication
A novel secure image hashing based on reversible watermarking for forensic analysis
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Seam carving estimation using forensic hash
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
A secure perceptual hash algorithm for image content authentication
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Radon transform-based secure image hashing
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Histogram-based image hashing for searching content-preserving copies
Transactions on data hiding and multimedia security VI
From image hashing to video hashing
MMM'10 Proceedings of the 16th international conference on Advances in Multimedia Modeling
Discriminative image hashing based on region of interest
MMM'10 Proceedings of the 16th international conference on Advances in Multimedia Modeling
Image forensic signature for content authenticity analysis
Journal of Visual Communication and Image Representation
Robust 3D mesh model hashing based on feature object
Digital Signal Processing
Perceptual image hashing via wave atom transform
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Robust image hashing using non-uniform sampling in discrete Fourier domain
Digital Signal Processing
Robust image content authentication using perceptual hashing and watermarking
PCM'12 Proceedings of the 13th Pacific-Rim conference on Advances in Multimedia Information Processing
Perceptual image hashing with histogram of color vector angles
AMT'12 Proceedings of the 8th international conference on Active Media Technology
Fast communication: Robust image hashing using ring-based entropies
Signal Processing
Robust and secure watermarking scheme for breath sound
Journal of Systems and Software
Key-dependent 3D model hashing for authentication using heat kernel signature
Digital Signal Processing
Memoryless hash-based perceptual image authentication
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Content-based copy detection through multimodal feature representation and temporal pyramid matching
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
Image hash functions find extensive applications in content authentication, database search, and watermarking. This paper develops a novel algorithm for generating an image hash based on Fourier transform features and controlled randomization. We formulate the robustness of image hashing as a hypothesis testing problem and evaluate the performance under various image processing operations. We show that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions. We introduce a general framework to study and evaluate the security of image hashing systems. Under this new framework, we model the hash values as random variables and quantify its uncertainty in terms of differential entropy. Using this security framework, we analyze the security of the proposed schemes and several existing representative methods for image hashing. We then examine the security versus robustness tradeoff and show that the proposed hashing methods can provide excellent security and robustness.