Robust and Secure Image Hashing
Top Cited Papers
- 5 June 2006
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Forensics and Security
- Vol. 1 (2), 215-230
- https://doi.org/10.1109/tifs.2006.873601
Abstract
Image hash functions find extensive applications in content authentication, database search, and watermarking. This paper develops a novel algorithm for generating an image hash based on Fourier transform features and controlled randomization. We formulate the robustness of image hashing as a hypothesis testing problem and evaluate the performance under various image processing operations. We show that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions. We introduce a general framework to study and evaluate the security of image hashing systems. Under this new framework, we model the hash values as random variables and quantify its uncertainty in terms of differential entropy. Using this security framework, we analyze the security of the proposed schemes and several existing representative methods for image hashing. We then examine the security versus robustness tradeoff and show that the proposed hashing methods can provide excellent security and robustness.Keywords
This publication has 28 references indexed in Scilit:
- On the security of the digest function in the SARI image authentication systemIEEE Transactions on Circuits and Systems for Video Technology, 2002
- On the design of content-based multimedia authentication systemsIEEE Transactions on Multimedia, 2002
- Compression tolerant image authenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Robust color histogram descriptors for video segment retrieval and identificationIEEE Transactions on Image Processing, 2002
- A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information HidingLecture Notes in Computer Science, 2001
- Approximate image message authentication codesIEEE Transactions on Multimedia, 2001
- Rotation, scale, and translation resilient watermarking for imagesIEEE Transactions on Image Processing, 2001
- A robust image authentication method distinguishing JPEG compression from malicious manipulationIEEE Transactions on Circuits and Systems for Video Technology, 2001
- The rate-distortion function for source coding with side information at the decoderIEEE Transactions on Information Theory, 1976
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949