Secure Perceptual Hashing of Data using Encryption

被引:0
|
作者
Sahana, M. S. [1 ]
机构
[1] Vidyavardhaka Coll Engn, Dept ECE, Mysuru, Karnataka, India
关键词
Image hashing; perceptual hashing; image authentication; feature extraction; Quantization;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Orthogonal A perceptual image hash function maps an image to a short binary - string based on an images appearance to human eye. This paper proposes a theoretical analysis of full perceptual hashing systems that use a quantization module followed by a crypto-compression module. Finally, several experiments are conducted to validate the approach, by Gaussian noise and JPEG compression. Finally the image is encrypted using secret key called SHA-1 (Secure Hash Alogorithm-1) of 128 bits.
引用
收藏
页码:524 / 528
页数:5
相关论文
共 50 条
  • [1] Secure Perceptual Hashing Scheme for Image using Encryption
    Sahana, M. S.
    Geetha, M. N.
    [J]. 2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 534 - 538
  • [2] Secure and robust image perceptual hashing
    Information Security Research Center, Dalian University of Technology, Dalian 116024, China
    不详
    [J]. Dongnan Daxue Xuebao, 2007, SUPPL. (188-192):
  • [3] Perceptual encryption with compression for secure vector map data processing
    Jang, Bong-Joo
    Lee, Suk-Hwan
    Kwon, Ki-Ryong
    [J]. DIGITAL SIGNAL PROCESSING, 2014, 25 : 224 - 243
  • [4] Secure Architecture and Protocols for Robust Perceptual Hashing
    Hu, Donghui
    Su, Bin
    Zheng, Shuli
    Zhang, Zhuang
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 550 - 554
  • [5] Provably secure authentication approach for data security in the cloud using hashing, encryption, and Chebyshev-based authentication
    Ahamad, Danish
    Akhtar, Md Mobin
    Hameed, Shabi Alam
    Al Qerom, Mahmoud Mohammad Mahmoud
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (05) : 475 - 497
  • [6] Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication
    Ahamad, Danish
    Akhtar, Md Mobin
    Hameed, Shabi Alam
    Al Qerom, Mahmoud Mohammad Mahmoud
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [7] Perceptual Robust and Secure Image Hashing Using Ring Partition-PGNMF
    Karsh, Ram Kumar
    Laskar, R. H.
    [J]. TENCON 2015 - 2015 IEEE REGION 10 CONFERENCE, 2015,
  • [8] Perceptual Video Encryption in Multimedia Secure Communication
    Bernatin, T.
    Kuzhaloli, S.
    Premi, M. S. Godwin
    Queen, L. Brathesia
    [J]. PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [9] Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption
    Zhang, Qiu-yu
    Wen, Yong-wang
    Huang, Yi-bo
    Li, Fang-peng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (26) : 67469 - 67500
  • [10] Secure Remote Data Collection System Using Data Encryption
    Rodrigues, Bruno
    Cardoso, Alberto
    Bernardino, Jorge
    Simoes, Nuno
    Marques, Jose
    [J]. IFAC PAPERSONLINE, 2019, 52 (27): : 400 - 405