Secure Architecture and Protocols for Robust Perceptual Hashing

被引:4
|
作者
Hu, Donghui [1 ]
Su, Bin [1 ]
Zheng, Shuli [1 ]
Zhang, Zhuang [2 ]
机构
[1] Hefei Univ Technol, Sch Comp Sci & Informat Engn, Hefei, Peoples R China
[2] Kingsoft Software Co, KIS Dept, Zhuhai, Peoples R China
关键词
Robust Perceptual hashing; Architecture; Protocol; Identification; Authentication; WATERMARKING; ENCRYPTION;
D O I
10.1109/CIS.2013.122
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a new architecture for the secure application of robust perceptual hashing. Protocols based on architecture of four parties are designed to ensure that no party can get the knowledge that may break the security of the hashing. A commutative hashing and encryption method that can generate multi-media hash on encryption domain is proposed to further resolve the privacy and security issues in the application of robust perceptual hashing.
引用
收藏
页码:550 / 554
页数:5
相关论文
共 50 条
  • [1] Secure and robust image perceptual hashing
    Information Security Research Center, Dalian University of Technology, Dalian 116024, China
    不详
    [J]. Dongnan Daxue Xuebao, 2007, SUPPL. (188-192):
  • [2] A robust and secure perceptual hashing system based on a quantization step analysis
    Hadmi, Azhar
    Puech, William
    Said, Brahim Ait Es
    Ouahman, Abdellah Ait
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (08) : 929 - 948
  • [3] A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication
    Shaik, Abdul Subhani
    Karsh, Ram Kumar
    Islam, Mohiul
    Singh, Surendra Pal
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [4] Perceptual Robust and Secure Image Hashing Using Ring Partition-PGNMF
    Karsh, Ram Kumar
    Laskar, R. H.
    [J]. TENCON 2015 - 2015 IEEE REGION 10 CONFERENCE, 2015,
  • [5] Robust perceptual audio hashing
    Özer, H
    Sankur, B
    [J]. PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, : 25 - 28
  • [6] Robust and secure image hashing
    Swaminathan, Ashwin
    Mao, Yinian
    Wu, Min
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (02) : 215 - 230
  • [7] Security and privacy protocols for perceptual image hashing
    Hu, Donghui
    Su, Bin
    Zheng, Shuli
    Zhao, Zhong-Qiu
    Wu, Xintao
    Wu, Xindong
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (03) : 146 - 162
  • [8] Secure Perceptual Hashing of Data using Encryption
    Sahana, M. S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 524 - 528
  • [9] Security analysis of robust perceptual hashing
    Koval, Oleksiy
    Voloshynovskiy, Sviatoslav
    Beekhof, Fokko
    Pun, Thierry
    [J]. SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X, 2008, 6819
  • [10] Secure Perceptual Hashing Scheme for Image using Encryption
    Sahana, M. S.
    Geetha, M. N.
    [J]. 2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 534 - 538