The art of computer programming, volume 3: (2nd ed.) sorting and searching
The art of computer programming, volume 3: (2nd ed.) sorting and searching
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Evaluation of Copyright Marking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Geometric distortion-resilient image hashing system and its application scalability
Proceedings of the 2004 workshop on Multimedia and security
Geometric Attacks on Image Watermarking Systems
IEEE MultiMedia
SSF fingerprint for image authentication: an incidental distortion resistant scheme
Proceedings of the 13th annual ACM international conference on Multimedia
Robustness and security of a wavelet-based CBIR hashing algorithm
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Histogram-based image hashing scheme robust against geometric deformations
Proceedings of the 9th workshop on Multimedia & security
Randomized radon transforms for biometric authentication via fingerprint hashing
Proceedings of the 2007 ACM workshop on Digital Rights Management
Key-dependent JPEG2000-based robust hashing for secure image authentication
EURASIP Journal on Information Security
A decision theoretic framework for analyzing binary hash-based content identification systems
Proceedings of the 8th ACM workshop on Digital rights management
Secure and incidental distortion tolerant digital signature for image authentication
Journal of Computer Science and Technology
Image copy detection using a robust gabor texture descriptor
LS-MMRM '09 Proceedings of the First ACM workshop on Large-scale multimedia retrieval and mining
A study on the randomness measure of image hashing
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Robust image copy detection using multi-resolution histogram
Proceedings of the international conference on Multimedia information retrieval
Biometrics-based identifiers for digital identity management
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Fragility analysis of adaptive quantization-based image hashing
IEEE Transactions on Information Forensics and Security
Content based image hashing via wavelet and radon transform
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
An extended image hashing concept: content-based fingerprinting using FJLT
EURASIP Journal on Information Security
A novel image copy detection scheme based on the local multi-resolution histogram descriptor
Multimedia Tools and Applications
Random Gray code and its performance analysis for image hashing
Signal Processing
A secure perceptual hash algorithm for image content authentication
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Radon transform-based secure image hashing
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Histogram-based image hashing for searching content-preserving copies
Transactions on data hiding and multimedia security VI
Personal rights management– enabling privacy rights in digital online content
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Compact and robust image hashing
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Personal rights management – taming camera-phones for individual privacy enforcement
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Image forensic signature for content authenticity analysis
Journal of Visual Communication and Image Representation
CARE: content aware redundancy elimination for challenged networks
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Hi-index | 0.00 |
We propose a novel and robust hashing paradigm that uses iterative geometric techniques and relies on observations that main geometric features within an image would approximately stay invariant under small perturbations. A key goal of this algorithm is to produce sufficiently randomized outputs which are unpredictable, thereby yielding properties akin to cryptographic MACs. This is a key component for robust multimedia identification and watermarking (for synchronization as well as content dependent key generation). Our algorithm withstands standard benchmark (e.g Stirmark) attacks provided they do not cause severe perceptually significant distortions. As verified by our detailed experiments, the approach is relatively media independent and works for audio as well.