Skip to main content

Robust Hash Functions for Visual Data: An Experimental Comparison

  • Conference paper
  • First Online:
Pattern Recognition and Image Analysis (IbPRIA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2652))

Included in the following conference series:

Abstract

Robust hash functions for visual data need a feature extraction mechanism to rely on. We experimentally compare spatial and transform domain feature extraction techniques and identify the global DCT combined with the cryptographic hash function MD-5 to be suited for visual hashing. This scheme offers robustness against JPEG2000 and JPEG compression and qualitative sensitivity to intentional global and local image alterations.

This work has been partially supported by the Austrian Science Fund FWF, project no. P15170.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the IEEE International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA (March 2000)

    Google Scholar 

  2. Kalker, T., Oostveen, J.T., Haitsma, J.: Visual hashing of digital video: applications and techniques. In: Tescher, A.G. (ed.) Applications of Digital Image Processing XXIV, San Diego, CA, USA, July 2001. Proceedings of SPIE, vol. 4472 (2001)

    Google Scholar 

  3. Kivanc Mihcak, M., Venkatesan, R.: A tool for robust audio information hiding: a perceptual audio hashing algorithm. In: Proceedings of the 4th Information Hiding Workshop 2001, Portland, OR, USA (April 2001)

    Google Scholar 

  4. Petitcolas, F.A.P., Fontaine, C., Dittmann, J., Steinebach, M., Fatès, N.: Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, January 2001, vol. 4314 (2001)

    Google Scholar 

  5. Schneier, B.: Applied cryptography: protocols, algorithms and source code in C, 2nd edn. Wiley Publishers, Chichester (1996)

    MATH  Google Scholar 

  6. Venkatesan, R., Koon, S.-M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proceedings of the IEEE International Conference on Image Processing, ICIP 2000, Vancouver, Canada (September 2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Skrepth, C.J., Uhl, A. (2003). Robust Hash Functions for Visual Data: An Experimental Comparison. In: Perales, F.J., Campilho, A.J.C., de la Blanca, N.P., Sanfeliu, A. (eds) Pattern Recognition and Image Analysis. IbPRIA 2003. Lecture Notes in Computer Science, vol 2652. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-44871-6_114

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-44871-6_114

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40217-6

  • Online ISBN: 978-3-540-44871-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics