Unicity distance of robust image hashing

被引:35
|
作者
Mao, Yinian [1 ]
Wu, Min
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Qualcomm Inc, San Diego, CA 92121 USA
关键词
image hashing; security; unicity distance;
D O I
10.1109/TIFS.2007.902260
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An image hash is a randomized compact representation of image content and finds applications in image authentication, image and video watermarking, and image similarity comparison. Usually, an image-hashing scheme is required to be robust and secure, and the security issue is particularly important in applications, such as multimedia authentication, watermarking, and fingerprinting. In this paper, we investigate the security of image hashing from the perspective of unicity distance, a concept pioneered by Shannon in one of his seminal papers. Using two recently proposed image-hashing schemes as representatives, we show that the concept of unicity distance can be adapted to evaluate the security of image hashing. Our analysis shows that the secret hashing key, or its equivalent form, can be estimated with high accuracy when the key is reused several dozen times. The estimated unicity distance determines the maximum number of key reuses in the investigated hashing schemes. A countermeasure of randomized key initialization is discussed to avoid key reuse and strengthen the security of robust image hashing.
引用
收藏
页码:462 / 467
页数:6
相关论文
共 50 条
  • [1] Robust Image Hashing With Ring Partition and Invariant Vector Distance
    Tang, Zhenjun
    Zhang, Xianquan
    Li, Xianxian
    Zhang, Shichao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) : 200 - 214
  • [2] Robust image hashing
    Venkatesan, R
    Koon, SM
    Jakubowski, MH
    Moulin, P
    [J]. 2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2000, : 664 - 666
  • [3] Robust and secure image hashing
    Swaminathan, Ashwin
    Mao, Yinian
    Wu, Min
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (02) : 215 - 230
  • [4] Compact and robust image hashing
    Tang, S
    Li, JT
    Zhang, YD
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 547 - 556
  • [5] Discovery of Tampered Image with Robust Hashing
    Tang, Zhenjun
    Yu, Junwei
    Zhang, Xianquan
    Zhang, Shichao
    [J]. ADVANCED DATA MINING AND APPLICATIONS, ADMA 2014, 2014, 8933 : 112 - 122
  • [6] Robust Image Hashing in Encrypted Domain
    Li, Xinran
    Guo, Mengqi
    Wang, Zichi
    Li, Jian
    Qin, Chuan
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024, 8 (01): : 670 - 683
  • [7] Robust image hashing with multidimensional scaling
    Tang, Zhenjun
    Huang, Ziqing
    Zhang, Xianquan
    Lao, Huan
    [J]. SIGNAL PROCESSING, 2017, 137 : 240 - 250
  • [8] Secure and robust image perceptual hashing
    Information Security Research Center, Dalian University of Technology, Dalian 116024, China
    不详
    [J]. Dongnan Daxue Xuebao, 2007, SUPPL. (188-192):
  • [9] Retrieval Oriented Robust Image Hashing
    Zuo, Jinglong
    Cui, Delong
    [J]. 2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL MECHATRONICS AND AUTOMATION, 2009, : 379 - 381
  • [10] Robust Image Hashing with Tensor Decomposition
    Tang, Zhenjun
    Chen, Lv
    Zhang, Xianquan
    Zhang, Shichao
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (03) : 549 - 560