Robust and secure image hashing

被引:361
|
作者
Swaminathan, Ashwin [1 ]
Mao, Yinian
Wu, Min
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Univ Maryland, Inst Adv Comp Studies, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
differential entropy; image authentication; image hashing; multimedia security;
D O I
10.1109/TIFS.2006.873601
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Image hash functions find extensive applications in content authentication, database search, and watermarking. This paper develops a novel algorithm for generating an image hash based on Fourier transform features and controlled randomization. We formulate the robustness of image hashing as a hypothesis testing problem and evaluate the performance under various image processing operations. We show that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions. We introduce a general framework to study and evaluate the security of image hashing systems. Under this new framework, we model the hash values as random variables and quantify its uncertainty in terms of differential entropy. Using this security framework, we analyze the security of the proposed schemes and several existing representative methods for image hashing. We then examine the security versus robustness tradeoff and show that the proposed hashing methods can provide excellent security and robustness.
引用
收藏
页码:215 / 230
页数:16
相关论文
共 50 条
  • [1] Secure and robust image hashing via compressive sensing
    Sun, Rui
    Zeng, Wenjun
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) : 1651 - 1665
  • [2] A Chaos Based Robust and Secure Image Hashing Framework
    Singh, Satendra Pal
    Bhatnagar, Gaurav
    [J]. ELEVENTH INDIAN CONFERENCE ON COMPUTER VISION, GRAPHICS AND IMAGE PROCESSING (ICVGIP 2018), 2018,
  • [3] Secure and robust image hashing via compressive sensing
    Rui Sun
    Wenjun Zeng
    [J]. Multimedia Tools and Applications, 2014, 70 : 1651 - 1665
  • [4] A signal processing and randomization perspective of robust and secure image hashing
    Wu, Min
    Mao, Yinian
    Swaminathan, Ashwin
    [J]. 2007 IEEE/SP 14TH WORKSHOP ON STATISTICAL SIGNAL PROCESSING, VOLS 1 AND 2, 2007, : 166 - 170
  • [5] A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
    Bashir, Iram
    Ahmed, Fawad
    Ahmad, Jawad
    Boulila, Wadii
    Alharbi, Nouf
    [J]. ENTROPY, 2019, 21 (11)
  • [6] A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication
    Shaik, Abdul Subhani
    Karsh, Ram Kumar
    Islam, Mohiul
    Singh, Surendra Pal
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [7] Fast Johnson-Lindenstrauss Transform for Robust and Secure Image Hashing
    Lv, Xudong
    Wang, Z. Jane
    [J]. 2008 IEEE 10TH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, VOLS 1 AND 2, 2008, : 729 - 733
  • [8] A secure and robust wavelet-based hashing scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    [J]. ADVANCES IN MULTIMEDIA MODELING, PT 2, 2007, 4352 : 51 - +
  • [9] Secure and robust DCT-based hashing scheme for image authenticational
    Ahmed, Fawad
    Siyal, M. Y.
    [J]. 2006 10TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2006, : 244 - +
  • [10] Robust image hashing
    Venkatesan, R
    Koon, SM
    Jakubowski, MH
    Moulin, P
    [J]. 2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2000, : 664 - 666