Image authentication using added signal-dependent noise
Research Letters in Signal Processing
Key-dependent JPEG2000-based robust hashing for secure image authentication
EURASIP Journal on Information Security
Information-theoretic hashing of 3D objects using spectral graph theory
Expert Systems with Applications: An International Journal
Secure and incidental distortion tolerant digital signature for image authentication
Journal of Computer Science and Technology
A novel image hash algorithm resistant to print-scan
Signal Processing
Robust video fingerprinting based on symmetric pairwise boosting
IEEE Transactions on Circuits and Systems for Video Technology
A study on the randomness measure of image hashing
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A secure and robust hash-based scheme for image authentication
Signal Processing
Fragility analysis of adaptive quantization-based image hashing
IEEE Transactions on Information Forensics and Security
Content based image hashing via wavelet and radon transform
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Compressive sensing-based image hashing
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Perceptual image hashing based on virtual watermark detection
IEEE Transactions on Image Processing
An extended image hashing concept: content-based fingerprinting using FJLT
EURASIP Journal on Information Security
Lexicographical framework for image hashing with implementation based on DCT and NMF
Multimedia Tools and Applications
WAMUS'07 Proceedings of the 7th WSEAS international conference on Wavelet analysis & multirate systems
Random Gray code and its performance analysis for image hashing
Signal Processing
Robust image hash in Radon transform domain for authentication
Image Communication
Discriminative image hashing based on region of interest
MMM'10 Proceedings of the 16th international conference on Advances in Multimedia Modeling
Image forensic signature for content authenticity analysis
Journal of Visual Communication and Image Representation
Content-based image authentication by feature point clustering and matching
Security and Communication Networks
Robust 3D mesh model hashing based on feature object
Digital Signal Processing
Perceptual image hashing via wave atom transform
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Robust image hashing using non-uniform sampling in discrete Fourier domain
Digital Signal Processing
Key-dependent 3D model hashing for authentication using heat kernel signature
Digital Signal Processing
Memoryless hash-based perceptual image authentication
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Stranger danger: exploring the ecosystem of ad-based URL shortening services
Proceedings of the 23rd international conference on World wide web
Hi-index | 0.02 |
We propose an image hashing paradigm using visually significant feature points. The feature points should be largely invariant under perceptually insignificant distortions. To satisfy this, we propose an iterative feature detector to extract significant geometry preserving feature points. We apply probabilistic quantization on the derived features to introduce randomness, which, in turn, reduces vulnerability to adversarial attacks. The proposed hash algorithm withstands standard benchmark (e.g., Stirmark) attacks, including compression, geometric distortions of scaling and small-angle rotation, and common signal-processing operations. Content changing (malicious) manipulations of image data are also accurately detected. Detailed statistical analysis in the form of receiver operating characteristic (ROC) curves is presented and reveals the success of the proposed scheme in achieving perceptual robustness while avoiding misclassification