Representations that uniquely characterize images modulo translation, rotation, and scaling
Pattern Recognition Letters
Progressive quantized projection watermarking scheme
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 1)
Rotation, Translation and Scale Invariant Digital Image Watermarking
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Robust Bit Extraction from Images
ICMCS '99 Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems - Volume 02
Geometric distortion-resilient image hashing system and its application scalability
Proceedings of the 2004 workshop on Multimedia and security
A Robust and Secure Media Signature Scheme for JPEG Images
Journal of VLSI Signal Processing Systems
Histogram-based image hashing scheme robust against geometric deformations
Proceedings of the 9th workshop on Multimedia & security
Key-dependent JPEG2000-based robust hashing for secure image authentication
EURASIP Journal on Information Security
Psycho-acoustic model-based message authentication coding for audio data
Proceedings of the 10th ACM workshop on Multimedia and security
VSYNC: a novel video file synchronization protocol
MM '08 Proceedings of the 16th ACM international conference on Multimedia
On improving robustness of video fingerprints based on projections of features
LS-MMRM '09 Proceedings of the First ACM workshop on Large-scale multimedia retrieval and mining
Performance analysis of Fridrich-Goljan self-embedding authentication method
IEEE Transactions on Information Forensics and Security
On improving the collision property of robust hashing based on projections
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Video fingerprinting based on moment invariants capturing appearance and motion
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Evaluation of JPEG2000 hashing for efficient authentication
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
A study on the randomness measure of image hashing
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Fragility analysis of adaptive quantization-based image hashing
IEEE Transactions on Information Forensics and Security
Perfomance analysis of the Fridrich-Goljan self-embedding authentication method
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Perceptual image hashing based on virtual watermark detection
IEEE Transactions on Image Processing
An extended image hashing concept: content-based fingerprinting using FJLT
EURASIP Journal on Information Security
Lexicographical framework for image hashing with implementation based on DCT and NMF
Multimedia Tools and Applications
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection
Fundamenta Informaticae
Random Gray code and its performance analysis for image hashing
Signal Processing
NPT based video watermarking with non-overlapping block matching
Transactions on computational science XI
Robust image hash in Radon transform domain for authentication
Image Communication
A secure perceptual hash algorithm for image content authentication
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Radon transform-based secure image hashing
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Histogram-based image hashing for searching content-preserving copies
Transactions on data hiding and multimedia security VI
A secure and robust wavelet-based hashing scheme for image authentication
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
Countermeasures for collusion attacks exploiting host signal redundancy
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Compact and robust image hashing
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Security enhancement of visual hashes through key dependent wavelet transformations
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
Personal rights management – taming camera-phones for individual privacy enforcement
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Image forensic signature for content authenticity analysis
Journal of Visual Communication and Image Representation
Perceptual image hashing via wave atom transform
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Robust image hashing using non-uniform sampling in discrete Fourier domain
Digital Signal Processing
Robust image content authentication using perceptual hashing and watermarking
PCM'12 Proceedings of the 13th Pacific-Rim conference on Advances in Multimedia Information Processing
Fast communication: Robust image hashing using ring-based entropies
Signal Processing
Memoryless hash-based perceptual image authentication
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
Digital watermarks have recently been proposed for authentication of both video data and still images and for integrity verification of visual multimedia. In such applications, the watermark has to depend on a secret key and on the original image. It is important that the dependence on the key be sensitive, while the dependence on the image be continuous (robust). Both requirements can be satisfied using special image digest functions that return the same bit-string for a whole class of images derived from an original image using common processing operations. It is further required that two completely different images produce completely different bit-strings. In this paper, we discuss methods how such robust hash functions can be built. We describe an algorithm and evaluate its performance. We also show how the hash bits As another application, the robust image digest can be used as a search index for an efficient image database search