Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations

  • Albert Meixner
  • Andreas Uhl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3617)

Abstract

Parameterized wavelet filters and wavelet packet subband structures are discussed to be used as key dependent wavelet transforms in order to enhance the security of wavelet based hashing schemes. Experiments show that key dependency and keyspace of the hashing scheme considered have been significantly improved. The attack resistance could only be slightly enhanced by using parametrized wavelet filters.

Keywords

Wavelet Packet Watermark Scheme Secret Image Random Partitioning Security Enhancement 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Dietl, W.M., Uhl, A.: Robustness against unauthorized watermark removal attacks via key-dependent wavelet packet subband structures. In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME 2004, Taipei, Taiwan (June 2004)Google Scholar
  2. 2.
    Dietl, W., Meerwald, P., Uhl, A.: Protection of wavelet-based watermarking systems using filter parametrization. Signal Processing (Special Issue on Security of Data Hiding Technologies) 83, 2095–2116 (2003)MATHGoogle Scholar
  3. 3.
    Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the IEEE International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA (March 2000)Google Scholar
  4. 4.
    Köckerbauer, T., Kumar, M., Uhl, A.: Lightweight JPEG 2000 confidentiality for mobile environments. In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME 2004, Taipei, Taiwan (June 2004)Google Scholar
  5. 5.
    Meixner, A., Uhl, A.: Analysis of a wavelet-based robust hash algorithm. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VI, Proceedings of SPIE, San Jose, CA, USA, January 2004, vol. 5306, pp. 772–783. SPIE (2004)Google Scholar
  6. 6.
    Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data — efficiency and security. ACM Multimedia Systems (Special issue on Multimedia Security) 9(3), 279–287 (2003)Google Scholar
  7. 7.
    Radhakrishnan, R., Xiong, Z., Memom, N.D.: Security of visual hash functions. In: Wong, P.W., Delp, E.J. (eds.) Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, January 2003. SPIE, vol. 5020 (2003)Google Scholar
  8. 8.
    Schneid, J., Pittner, S.: On the parametrization of the coefficients of dilation equations for compactly supported wavelets. Computing 51, 165–173 (1993)MATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Venkatesan, R., Koon, S.-M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2000), Vancouver, Canada (September 2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Albert Meixner
    • 1
  • Andreas Uhl
    • 2
  1. 1.Department of Computer ScienceDuke UniversityUSA
  2. 2.Department of Scientific ComputingSalzburg UniversityAustria

Personalised recommendations