Secure Perceptual Hashing of Data using Encryption

被引:0
|
作者
Sahana, M. S. [1 ]
机构
[1] Vidyavardhaka Coll Engn, Dept ECE, Mysuru, Karnataka, India
关键词
Image hashing; perceptual hashing; image authentication; feature extraction; Quantization;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Orthogonal A perceptual image hash function maps an image to a short binary - string based on an images appearance to human eye. This paper proposes a theoretical analysis of full perceptual hashing systems that use a quantization module followed by a crypto-compression module. Finally, several experiments are conducted to validate the approach, by Gaussian noise and JPEG compression. Finally the image is encrypted using secret key called SHA-1 (Secure Hash Alogorithm-1) of 128 bits.
引用
收藏
页码:524 / 528
页数:5
相关论文
共 50 条
  • [21] Privacy-enhanced Perceptual Hashing of Audio Data
    Knospe, Heiko
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 549 - 554
  • [22] Perceptual Hashing Using Pretrained Vision Transformers
    De Geest, Jelle
    De Smet, Patrick
    Bonetto, Lucio
    Lambert, Peter
    Van Wallendael, Glenn
    Mareen, Hannes
    [J]. 2024 IEEE GAMING, ENTERTAINMENT, AND MEDIA CONFERENCE, GEM 2024, 2024, : 19 - 24
  • [23] WALKING DIRECTION IDENTIFICATION USING PERCEPTUAL HASHING
    Verlekar, Tanmay T.
    Correia, Paulo L.
    [J]. 2016 4TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS (IWBF), 2016,
  • [24] Secure data aggregation with multiple encryption
    Onen, Melek
    Molva, Refik
    [J]. WIRELESS SENSOR NETWORKS, PROCEEDINGS, 2007, 4373 : 117 - +
  • [25] Secure data aggregation in wireless sensor networks using homomorphic encryption
    Kumar, Manish
    Verma, Shekhar
    Lata, Kusum
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS, 2015, 102 (04) : 690 - 702
  • [26] Secure Reversible Data Hiding Technique on Textures using Double Encryption
    Banu, Shahara T.
    Shajeesh, K. U.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [27] SECURE COMPUTATION ON SENSITIVE DATA USING HOMOMORPHIC ENCRYPTION ON ETHEREUM BLOCKCHAIN
    Şerban, Răzvan
    Vochescu, Alexandru
    Dosaru, Daniel
    [J]. UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2024, 86 (02): : 273 - 284
  • [28] Secure Data Computation Using Deep Learning and Homomorphic Encryption: A Survey
    Al-Janabi, Anmar A.
    Al-Janabi, Sufyan T. Faraj
    Al-Khateeb, Belal
    [J]. INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2023, 19 (11) : 53 - 82
  • [29] Secure storage and accessing the data in cloud using optimized homomorphic encryption
    Sophia, S. Gnana
    Thanammal, K. K.
    Sujatha, S. S.
    [J]. JOURNAL OF CONTROL AND DECISION, 2023, 10 (01) : 90 - 98
  • [30] Using Highly Secure Data Encryption Method for Text File Cryptography
    Abu-Faraj, Mua'ad M.
    Alqadi, Ziad A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (12): : 53 - 60