Perceptual Image Hashing
نویسندگان
چکیده
With the fast advancement of computer, multimedia and network technologies, the amount of multimedia information that is conveyed, broadcast or browsed via digital devices has grown exponentially. Simultaneously, digital forgery and unauthorized use have reached a significant level that makes multimedia authentication and security very challenging and demanding. The ability to detect changes in multimedia data has been very important for many applications, especially for journalistic photography, medical or artwork image databases. This has spurred interest in developing more robust algorithms and techniques to allow to check safety of exchanged multimedia data confidentiality, authenticity and integrity. Confidentiality means that the exchange between encrypted multimedia data entities, which without decryption key, is unintelligible. Confidentiality is achieved mainly through encryption schemes, either secret key or public key. Authentication is an another crucial issue of multimedia data protection, it makes possible to trace the author of the multimedia data and allow to determine if an original multimedia data content was altered in any way from the time of its recording. Integrity allows degradation detection of multimedia and helps make sure that the received multimedia data has not been modified by a third party for malicious reasons. Many attempts have been noted to secure multimedia data from illegal use by different techniques fields such as encryption field, watermarking field and perceptual image hashing field. The field of encryption is becoming very important in the present era in which information security is of the utmost concern to provide end-to-end security. Multimedia data encryption has applications in internet communication, multimedia systems, medical imaging, telemedicine, military communication, etc. Although we may use the traditional cryptosystems to encrypt multimedia data directly, it is not a good idea for two reasons. The first reason is that the multimedia data size is almost always much great. Therefore, the traditional cryptosystems need much more time to directly encrypt the multimedia data. The other problem is that the decrypted multimedia data must be equal to the original multimedia data. However, this requirement is not necessary for image/video data. Due to the characteristic of human perception, a decryptedmultimedia containing small distortion is usually acceptable. Deciding upon what level of security is needed is harder than it looks. To identify an optimal security level, the cost of the multimedia information to be protected and the cost of the protection itself are to be compared carefully. At present, many available image encryption algorithms have been proposed (Ozturk & Ibrahim, 2005; 2
منابع مشابه
Image authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملCompressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کاملA robust and secure perceptual hashing system based on a quantization step analysis
Perceptual hashing is conventionally used for content identification and authentication. It has applications in database content search, watermarking and image retrieval. Most countermeasures proposed in the literature generally focus on the feature extraction stage to get robust features to authenticate the image, but few studies address the perceptual hashing security achieved by a cryptograp...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will lead to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for perce...
متن کاملPerceptual Hashing for Color Images Using Invariant Moments
Image hashing is a new technology in multimedia security. It maps visually identical images to the same or similar short strings called image hashes, and finds applications in image retrieval, image authentication, digital watermarking, image indexing, and image copy detection. This paper presents a perceptual hashing for color images. The input image in RGB color space is firstly converted int...
متن کاملSpeech Authentication Based on Perceptual Fingerprint Hashing
A perceptual fingerprint hashing method is proposed for audio authentication in this paper. First, the biologic fingerprint image is divided into overlapping rectangle blocks by randomly using a chaotic sequence, and then the gravity center of each block is calculated. Finally, the perceptual Hashing value is generated based on the gravity center of each block. To authenticate the speech identi...
متن کامل