ForBild: Efficient Robust Image Hashing

被引:3
|
作者
Steinebach, Martin [1 ]
Liu, Huajian [1 ]
Yannikos, York [1 ]
机构
[1] Fraunhofer SIT, D-64295 Darmstadt, Germany
关键词
image forensics; robust hashing; fingerprinting; benchmarking;
D O I
10.1117/12.907856
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Forensic analysis of image sets today is most often done with the help of cryptographic hashes due to their efficiency, their integration in forensic tools and their excellent reliability in the domain of false detection alarms. A drawback of these hash methods is their fragility to any image processing operation. Even a simple re-compression with JPEG results in an image not detectable. A different approach is to apply image identification methods, allowing identifying illegal images by e. g. semantic models or facing detection algorithms. Their common drawback is a high computational complexity and significant false alarm rates. Robust hashing is a well-known approach sharing characteristics of both cryptographic hashes and image identification methods. It is fast, robust to common image processing and features low false alarm rates. To verify its usability in forensic evaluation, in this work we discuss and evaluate the behavior of an optimized block-based hash.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Efficient Cropping-Resistant Robust Image Hashing
    Steinebach, Martin
    Liu, Huajian
    Yannikos, York
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 579 - 585
  • [2] Robust image hashing
    Venkatesan, R
    Koon, SM
    Jakubowski, MH
    Moulin, P
    [J]. 2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2000, : 664 - 666
  • [3] Robust and secure image hashing
    Swaminathan, Ashwin
    Mao, Yinian
    Wu, Min
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (02) : 215 - 230
  • [4] Compact and robust image hashing
    Tang, S
    Li, JT
    Zhang, YD
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 547 - 556
  • [5] Robust Image Hashing Based Efficient Authentication for Smart Industrial Environment
    Sajjad, Muhammad
    Ul Haq, Ijaz
    Lloret, Jaime
    Ding, Weiping
    Muhammad, Khan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6541 - 6550
  • [6] Efficient and Robust Perceptual Hashing Using Log-Polar Image Representation
    Plesca, Cezar
    Morogan, Luciana
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [7] Discovery of Tampered Image with Robust Hashing
    Tang, Zhenjun
    Yu, Junwei
    Zhang, Xianquan
    Zhang, Shichao
    [J]. ADVANCED DATA MINING AND APPLICATIONS, ADMA 2014, 2014, 8933 : 112 - 122
  • [8] Robust Image Hashing in Encrypted Domain
    Li, Xinran
    Guo, Mengqi
    Wang, Zichi
    Li, Jian
    Qin, Chuan
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024, 8 (01): : 670 - 683
  • [9] Robust image hashing with multidimensional scaling
    Tang, Zhenjun
    Huang, Ziqing
    Zhang, Xianquan
    Lao, Huan
    [J]. SIGNAL PROCESSING, 2017, 137 : 240 - 250
  • [10] Secure and robust image perceptual hashing
    Information Security Research Center, Dalian University of Technology, Dalian 116024, China
    不详
    [J]. Dongnan Daxue Xuebao, 2007, SUPPL. (188-192):