Skip to main content

An Introduction to the Principles and Requirements of Robust Hashing

  • Chapter
Book cover Intelligent Multimedia Analysis for Security Applications

Part of the book series: Studies in Computational Intelligence ((SCI,volume 282))

  • 826 Accesses

Introduction

A robust hash is essentially a low-dimensional representation of a multimedia signal which is linked to its perceptual content. This representation acts as a descriptor which allows for flexible identification of this type of signal. Flexibility is needed because any multimedia signal —that is, image, audio, or video— may appear in slightly different but perceptually equivalent forms owing to lossy compression, transcoding, clipping/cropping, or a number of other reasons. Therefore, identifiers strictly associated to a particular bit representation of a multimedia signal —such as a cryptographic hash [1]— are far too strict. If robust hashing is to become something like “cryptographic hashing for multimedia” then it is reasonable to expect from it key properties of cryptographic hashing while simultaneously trying to overcome its intrinsic limitation with respect to multimedia signals. Exploiting source coding with distortion constraints is the natural way to achieve this end. The connection between these two areas is explored further on in this chapter in an attempt to produce an accurate definition of robust hashing and its requirements conforming to the point of view expressed above. This point of view is perhaps not the most common in the literature of the subject, which has mainly dealt with the production of robust low-dimensional descriptors but not so much with their connection with cryptographic hashing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Oppliger, R.: Contemporary Cryptography. Artech House (2005)

    Google Scholar 

  2. Kilian, J., Leighton, F., Matheson, L., Shamoon, T., Tarjan, R., Zane, F.: Resistance of digital watermarks to collusive attacks. In: Proceedings of the IEEE International Symposium on Information Theory, p. 271 (1998)

    Google Scholar 

  3. Subramanya, S., Simha, R., Narahari, B., Youssef, A.: Transform-based indexing of audio data for multimedia databases. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems 1997. pp. 211–218 (1997)

    Google Scholar 

  4. Cohen, S., Guibas, L.: Shape-based image retrieval using geometric hashing. In: Procs. of the ARPA Image Understanding Workshop (1997)

    Google Scholar 

  5. Fridrich, J.: Robust bit extraction from images. In: Proc. IEEE ICMCS, Florence, Italy, pp. 536–540 (1999)

    Google Scholar 

  6. Venkatesan, R., Koon, S., Jakubowski, M., Moulin, P.: Robust image hashing. In: Procs. of the IEEE International Conference on Image Processing, Vancouver, Canada (2000)

    Google Scholar 

  7. Mihçak, M.K., Venkatesan, R.: A perceptual audio hashing algorithm: A tool for robust audio identification and information hiding. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 51–65. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Haitsma, J., Kalker, T., Oostveen, J.: Robust audio hashing for content identification. In: Procs. of the International Workshop on Content-Based Multimedia Indexing, Brescia, Italy, pp. 117–125 (2001)

    Google Scholar 

  9. Martinian, E., Wornell, G., Chen, B.: Authentication with distortion criteria. IEEE Transactions on Information Theory 51(7), 2523–2542 (2005)

    Article  MathSciNet  Google Scholar 

  10. Cano, P., Batlle, E., Kalker, T., Haitsma, J.: A review of audio fingerprinting. J. VLSI Signal Process. Syst. 41(3), 271–284 (2005)

    Article  Google Scholar 

  11. Wang, A.: The Shazam music recognition service. Communications of the ACM 49(8), 44–48 (2006)

    Article  Google Scholar 

  12. McCarthy, E.P., Balado, F., Silvestre, G.C.M., Hurley, N.J.: A framework for soft hashing and its application to robust image hashing. In: Procs. of the IEEE International Conference on Image Processing, Singapore (2004)

    Google Scholar 

  13. Voloshynovskiy, S., Koval, O., Beekhof, F., Pun, T.: Conception and limits of robust perceptual hashing: towards side information assisted hash functions. In: Media Forensics and Security, vol. 7254. SPIE, San Jose (2009)

    Google Scholar 

  14. Rivest, R.: The MD5 message-digest algorithm. Technical report, IETF Network Working Group (1992)

    Google Scholar 

  15. Federal Information Processing Standard: Secure hash standard. Technical report, National Institute of Standards and Technology, US Department of Commerce, Washington, USA (1995)

    Google Scholar 

  16. Contini, S., Steinfeld, R., Pieprzyk, J., Matusiewicz, K.: A critical look at cryptographic hash function literature. In: ECRYPT Hash Workshop (2007)

    Google Scholar 

  17. Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)

    Google Scholar 

  18. Pradhan, S., Chou, J., Ramchandran, K.: Duality between source coding and channel coding and its extension to the side information case. IEEE Transactions on Information Theory 49(5), 1181–1203 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  19. Johnson, M., Ramchandran, K.: Dither-based secure image hashing using distributed coding. In: Procs. of the IEEE International Conf. on Image Processing, Barcelona, Spain, vol. 2, pp. 751–754 (2003)

    Google Scholar 

  20. Cayre, F., Fontaine, C., Furon, T.: Watermarking security: theory and practice. IEEE Transactions on Signal Processing 53(10), 3976–3987 (2005)

    Article  MathSciNet  Google Scholar 

  21. Koval, O., Voloshynovskiy, S., Beekhof, F., Pun, T.: Security analysis of robust perceptual hashing. SPIE Conference Series, vol. 6819 (2008)

    Google Scholar 

  22. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Blind Newton sensitivity attack. IEE Proceedings of Information Security 153(3), 115–125 (2006)

    Article  Google Scholar 

  23. Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1(2), 215–230 (2006)

    Article  Google Scholar 

  24. Lefebvre, F., Macq, B., Legat, J.D.: Rash: Radon soft hash algorithm. In: Eurasip (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Balado, F. (2010). An Introduction to the Principles and Requirements of Robust Hashing. In: Sencar, H.T., Velastin, S., Nikolaidis, N., Lian, S. (eds) Intelligent Multimedia Analysis for Security Applications. Studies in Computational Intelligence, vol 282. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11756-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11756-5_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11754-1

  • Online ISBN: 978-3-642-11756-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics