Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations
نویسندگان
چکیده
Parameterized wavelet filters and wavelet packet subband structures are discussed to be used as key dependent wavelet transforms in order to enhance the security of wavelet based hashing schemes. Experiments show that key dependency and keyspace of the hashing scheme considered have been significantly improved. The attack resistance could only be slightly enhanced by using parametrized wavelet filters.
منابع مشابه
SEIMCHA: a new semantic image CAPTCHA using geometric transformations
As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing image CAPTCHAs. Some methods apply a set of modifications such as rotations to the original imag...
متن کاملContrast Enhancement of Mammograms for Rapid Detection of Microcalcification Clusters
Introduction Breast cancer is one of the most common types of cancer among women. Early detection of breast cancer is the key to reducing the associated mortality rate. The presence of microcalcifications clusters (MCCs) is one of the earliest signs of breast cancer. Due to poor imaging contrast of mammograms and noise contamination, radiologists may overlook some diagnostic signs, specially t...
متن کاملOn security threats for robust perceptual hashing
Perceptual hashing has to deal with the constraints of robustness, accuracy and security. After modeling the process of hash extraction and the properties involved in this process, two different security threats are studied, namely the disclosure of the secret feature space and the tampering of the hash. Two different approaches for performing robust hashing are presented: Random-Based Hash (RB...
متن کاملFind Me a Hash, Volume 53, Number 3
W e're accustomed to hearing about the unreasonable effectiveness of mathematics, delightful—and unex-pected—applications of theory to the real world. In the world of the In-ternet, we've seen it in the use of number theory in public-key cryptography (the Diffie-Hellman system , the RSA algorithm, elliptic curve cryptosys-tems), in the utilization of graph theory in network design. In the world...
متن کاملFind Me a Hash
W e're accustomed to hearing about the unreasonable effectiveness of mathematics, delightful—and unex-pected—applications of theory to the real world. In the world of the In-ternet, we've seen it in the use of number theory in public-key cryptography (the Diffie-Hellman system , the RSA algorithm, elliptic curve cryptosys-tems), in the utilization of graph theory in network design. In the world...
متن کامل