The proliferation of digital images creates problems for managing large image databases, indexing individual images, and protecting intellectual property. This paper introduces a novel image indexing technique that may be called an image hash function. The algorithm uses randomized signal processing strategies for a non-reversible compression of images into random binary strings, and is shown to be robust against image changes due to compression, geometric distortions, and other attacks. This algorithm brings to images a direct analog of Message Authentication Codes (MACs) from cryptography, in which a main goal is to make hash values on a set of distinct inputs pairwise independent. This minimizes the probability that two hash values colli...
This paper proposes a robust and secure perceptual image hashing technique based on random sub-image...
Forensic analysis of image sets today is most often done with the help of cryptographic hashes due t...
Robust hashing is an emerging field that can be used to hash certain data types in applications unsu...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
Part 1: Research PapersInternational audiencePerceptual hashing is a promising solution to image con...
With the intensively increasing of digital media new challenges has been created for authentication ...
Part 2: Work in ProgressInternational audienceThis paper presents a robust and secure image hash alg...
[[abstract]]This paper proposes a robust image hashing method in discrete Fourier domain that can be...
This paper proposes a robust image hashing method which is robust against common image processing at...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
In this paper, a new image hashing scheme satisfying robustness and security is proposed. We exploit...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
This paper proposes a robust and secure perceptual image hashing technique based on random sub-image...
Forensic analysis of image sets today is most often done with the help of cryptographic hashes due t...
Robust hashing is an emerging field that can be used to hash certain data types in applications unsu...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
Part 1: Research PapersInternational audiencePerceptual hashing is a promising solution to image con...
With the intensively increasing of digital media new challenges has been created for authentication ...
Part 2: Work in ProgressInternational audienceThis paper presents a robust and secure image hash alg...
[[abstract]]This paper proposes a robust image hashing method in discrete Fourier domain that can be...
This paper proposes a robust image hashing method which is robust against common image processing at...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
In this paper, a new image hashing scheme satisfying robustness and security is proposed. We exploit...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
This paper proposes a robust and secure perceptual image hashing technique based on random sub-image...
Forensic analysis of image sets today is most often done with the help of cryptographic hashes due t...
Robust hashing is an emerging field that can be used to hash certain data types in applications unsu...