IbPRIA 2003: Pattern Recognition and Image Analysis pp 986-993 | Cite as
Robust Hash Functions for Visual Data: An Experimental Comparison
Conference paper
Abstract
Robust hash functions for visual data need a feature extraction mechanism to rely on. We experimentally compare spatial and transform domain feature extraction techniques and identify the global DCT combined with the cryptographic hash function MD-5 to be suited for visual hashing. This scheme offers robustness against JPEG2000 and JPEG compression and qualitative sensitivity to intentional global and local image alterations.
Keywords
Hash Function Wavelet Transform Visual Data JPEG Compression Feature Extraction Technique
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- 1.Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the IEEE International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA (March 2000)Google Scholar
- 2.Kalker, T., Oostveen, J.T., Haitsma, J.: Visual hashing of digital video: applications and techniques. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXIV, San Diego, CA, USA, July 2001. Proceedings of SPIE, vol. 4472 (2001)Google Scholar
- 3.Kivanc Mihcak, M., Venkatesan, R.: A tool for robust audio information hiding: a perceptual audio hashing algorithm. In: Proceedings of the 4th Information Hiding Workshop 2001, Portland, OR, USA (April 2001)Google Scholar
- 4.Petitcolas, F.A.P., Fontaine, C., Dittmann, J., Steinebach, M., Fatès, N.: Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, January 2001, vol. 4314 (2001)Google Scholar
- 5.Schneier, B.: Applied cryptography: protocols, algorithms and source code in C, 2nd edn. Wiley Publishers, Chichester (1996)MATHGoogle Scholar
- 6.Venkatesan, R., Koon, S.-M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proceedings of the IEEE International Conference on Image Processing, ICIP 2000, Vancouver, Canada (September 2000)Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2003