In this paper, a new image hashing scheme satisfying robustness and security is proposed. We exploit the property of dimensionality reduction inherent in compressive sensing/sampling (CS) for image hash design. The gained benefits include (1) the hash size can be kept small and (2) the CS-based hash is computationally secure. We study the use of visual information fidelity (VIF) for hash comparison under Stirmark attacks. We further derive the relationships between the hash of an image and both of its MSE distortion and visual quality measured by VIF, respectively. Hence, based on hash comparisons, both the distortion and visual quality of a query image can be approximately estimated without accessing its original version. We also derive th...
a b s t r a c t Perceptual hashing is conventionally used for content identification and authenticat...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
This thesis is devoted to the analysis and implementation of image hashing based on the article "Rob...
Security is still a relatively unexplored issue in image hash-ing. In this paper, we address this pr...
In this paper, a novel hash-based image content authentication scheme for tamper detection and local...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
The proliferation of digital images creates problems for managing large image databases, indexing in...
Perceptual hashing is conventionally used for content identification and authentication. In this wor...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Part 1: Research PapersInternational audiencePerceptual hashing is a promising solution to image con...
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robus...
Hashes can be used to provide authentication of multimedia con-tents. In the case of images, a hash ...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
a b s t r a c t Perceptual hashing is conventionally used for content identification and authenticat...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
This thesis is devoted to the analysis and implementation of image hashing based on the article "Rob...
Security is still a relatively unexplored issue in image hash-ing. In this paper, we address this pr...
In this paper, a novel hash-based image content authentication scheme for tamper detection and local...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
The proliferation of digital images creates problems for managing large image databases, indexing in...
Perceptual hashing is conventionally used for content identification and authentication. In this wor...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Part 1: Research PapersInternational audiencePerceptual hashing is a promising solution to image con...
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robus...
Hashes can be used to provide authentication of multimedia con-tents. In the case of images, a hash ...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
a b s t r a c t Perceptual hashing is conventionally used for content identification and authenticat...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...