Perceptual Video Hashing for Content Identification and Authentication

被引:28
|
作者
Khelifi, Fouad [1 ]
Bouridane, Ahmed [1 ]
机构
[1] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
Authentication; forgery detection; identification; robustness; video hashing; ROBUST; ALGORITHM;
D O I
10.1109/TCSVT.2017.2776159
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Perceptual hashing has been broadly used in the literature to identify similar contents for video copy detection. It has also been adopted to detect malicious manipulations for video authentication. However, targeting both applications with a single system using the same hash would be highly desirable as this saves the storage space and reduces the computational complexity. This paper proposes a perceptual video hashing system for content identification and authentication. The objective is to design a hash extraction technique that can withstand signal processing operations on one hand and detect malicious attacks on the other hand. The proposed system relies on a new signal calibration technique for extracting the hash using the discrete cosine transform (DCT) and the discrete sine transform (DST). This consists of determining the number of samples, called the normalizing shift, that is required for shifting a digital signal so that the shifted version matches a certain pattern according to DCT/DST coefficients. The rationale for the calibration idea is that the normalizing shift resists signal processing operations while it exhibits sensitivity to local tampering (i.e., replacing a small portion of the signal with a different one). While the same hash serves both applications, two different similarity measures have been proposed for video identification and authentication, respectively. Through intensive experiments with various types of video distortions and manipulations, the proposed system has been shown to outperform related state-of-the art video hashing techniques in terms of identification and authentication with the advantageous ability to locate tampered regions.
引用
收藏
页码:50 / 67
页数:18
相关论文
共 50 条
  • [41] Perceptual Video Hashing Based on the Achlioptas's Random Projections
    Sandeep, R.
    Bora, Prabin K.
    2013 FOURTH NATIONAL CONFERENCE ON COMPUTER VISION, PATTERN RECOGNITION, IMAGE PROCESSING AND GRAPHICS (NCVPRIPG), 2013,
  • [42] PERCEPTUAL VIDEO HASHING IN P2P NETWORKS
    Koz, Alper
    Lagendijk, R. L.
    2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, : 1842 - 1845
  • [43] A benchmark for perceptual hashing based on human subjective identification
    Zhang, Hui
    Li, Qiong
    Zhang, Haibin
    Niu, Xiamu
    Information Technology Journal, 2009, 8 (04) : 544 - 550
  • [44] Robust image hashing based on structural and perceptual features for authentication of color images
    Khan M.F.
    Monir S.M.
    Naseem I.
    Khan, Muhammad Farhan (farhanazeemi@hotmail.com), 1600, Turkiye Klinikleri (29): : 648 - 662
  • [45] An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition
    School of Computer and Communication, Lanzhou University of Technology, Lanzhou
    Gansu
    730050, China
    J. Inf. Hiding Multimedia Signal Proces., 2 (311-322):
  • [46] A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication
    Shaik, Abdul Subhani
    Karsh, Ram Kumar
    Islam, Mohiul
    Singh, Surendra Pal
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [47] Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment
    Zhang, Qiu-Yu
    Hu, Wen-Jin
    Huang, Yi-Bo
    Qiao, Si-Bin
    INTELLIGENT COMPUTING THEORIES AND APPLICATION, ICIC 2016, PT I, 2016, 9771 : 99 - 111
  • [48] Robust image hashing based on structural and perceptual features for authentication of color images
    Khan, Muhammad Farhan
    Monir, Syed Muhammad
    Naseem, Imran
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2021, 29 (02) : 648 - 662
  • [49] Perceptual Video Hashing With Secure Anti-Noise Model for Social Video Retrieval
    Chen, Lv
    Ye, Dengpan
    Shang, Yueyun
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) : 2648 - 2664
  • [50] Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme
    Zhang Qiu-yu
    Ren Zhan-wei
    Huang Yi-bo
    Yu Shuang
    Hu Wen-jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 229 - 240