Perceptual Video Hashing for Content Identification and Authentication

被引:28
|
作者
Khelifi, Fouad [1 ]
Bouridane, Ahmed [1 ]
机构
[1] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
Authentication; forgery detection; identification; robustness; video hashing; ROBUST; ALGORITHM;
D O I
10.1109/TCSVT.2017.2776159
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Perceptual hashing has been broadly used in the literature to identify similar contents for video copy detection. It has also been adopted to detect malicious manipulations for video authentication. However, targeting both applications with a single system using the same hash would be highly desirable as this saves the storage space and reduces the computational complexity. This paper proposes a perceptual video hashing system for content identification and authentication. The objective is to design a hash extraction technique that can withstand signal processing operations on one hand and detect malicious attacks on the other hand. The proposed system relies on a new signal calibration technique for extracting the hash using the discrete cosine transform (DCT) and the discrete sine transform (DST). This consists of determining the number of samples, called the normalizing shift, that is required for shifting a digital signal so that the shifted version matches a certain pattern according to DCT/DST coefficients. The rationale for the calibration idea is that the normalizing shift resists signal processing operations while it exhibits sensitivity to local tampering (i.e., replacing a small portion of the signal with a different one). While the same hash serves both applications, two different similarity measures have been proposed for video identification and authentication, respectively. Through intensive experiments with various types of video distortions and manipulations, the proposed system has been shown to outperform related state-of-the art video hashing techniques in terms of identification and authentication with the advantageous ability to locate tampered regions.
引用
收藏
页码:50 / 67
页数:18
相关论文
共 50 条
  • [1] Perceptual hashing method for video content authentication with maximized robustness
    Ma, Qiang
    Xing, Ling
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2021, 2021 (01)
  • [2] Perceptual hashing method for video content authentication with maximized robustness
    Qiang Ma
    Ling Xing
    EURASIP Journal on Image and Video Processing, 2021
  • [3] Audio content identification by using perceptual hashing
    Lancini, R
    Mapelli, F
    Pezzano, R
    2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 739 - 742
  • [4] Performance analysis of image content identification on perceptual hashing
    Pan, Hui
    Zheng, Gang
    Hu, Xiaohui
    Ma, Hengtai
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2012, 24 (07): : 925 - 931
  • [5] Perceptual hashing of video content based on differential block similarity
    Zhou, XB
    Schmucker, M
    Brown, CL
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 80 - 85
  • [6] A Robust Video Identification Framework using Perceptual Image Hashing
    Vega, Francisco
    Medina, Jose
    Mendoza, Daniel
    Saquicela, Victor
    Espinoza, Mauricio
    2017 XLIII LATIN AMERICAN COMPUTER CONFERENCE (CLEI), 2017,
  • [7] Perceptual hashing for image authentication: A survey
    Du, Ling
    Ho, Anthony T. S.
    Cong, Runmin
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 81
  • [8] Perceptual image hashing based on a deep convolution neural network for content authentication
    Jiang, Cuiling
    Pang, Yilin
    JOURNAL OF ELECTRONIC IMAGING, 2018, 27 (04)
  • [9] Image Perceptual Hashing for Content Authentication Based on Geometric Invariant Vector Distance
    Xing, Huifen
    Wang, Shuchao
    Wu, Qilin
    Wang, Honghai
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [10] Image perceptual hashing for content authentication based on Watson’s visual model and LLE
    Huifen Xing
    Hui Che
    Qilin Wu
    Honghai Wang
    Journal of Real-Time Image Processing, 2023, 20