ISBN 9780819475046International audiencePerceptual hashing has to deal with the constraints of robustness, accuracy and security. After modeling the process of hash extraction and the properties involved in this process, two different security threats are studied, namely the disclosure of the secret feature space and the tampering of the hash. Two different approaches for performing robust hashing are presented: Random-Based Hash (RBH) where the security is achieved using a random pro jection matrix and Content-Based Hash (CBH) were the security relies on the difficulty to tamper the hash. As for digital watermarking, different security setups are also devised: the Batch Hash Attack, the Group Hash Attack, the Unique Hash Attack and the Sensitiv...
Robust hashing is an emerging field that can be used to hash certain data types in applications unsu...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...
Perceptual hashing has to deal with the constraints of robustness, accuracy and security. After mode...
This paper develops a joint hashing/watermarking scheme in which a short hash of the host signal is ...
Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for auto...
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robus...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
a b s t r a c t Perceptual hashing is conventionally used for content identification and authenticat...
Although hash functions are a well-known method in computer science to map arbitrary large data to b...
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the sec...
International audienceMost cryptographic protocols use cryptographic hash functions as a building bl...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
Abstract. In this paper, we develop a new attack on Damg̊ard-Merkle hash functions, called the herdi...
Perceptual hashing is a promising tool for multimedia content authentication. Digital watermarking i...
Robust hashing is an emerging field that can be used to hash certain data types in applications unsu...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...
Perceptual hashing has to deal with the constraints of robustness, accuracy and security. After mode...
This paper develops a joint hashing/watermarking scheme in which a short hash of the host signal is ...
Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for auto...
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robus...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
a b s t r a c t Perceptual hashing is conventionally used for content identification and authenticat...
Although hash functions are a well-known method in computer science to map arbitrary large data to b...
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the sec...
International audienceMost cryptographic protocols use cryptographic hash functions as a building bl...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
Abstract. In this paper, we develop a new attack on Damg̊ard-Merkle hash functions, called the herdi...
Perceptual hashing is a promising tool for multimedia content authentication. Digital watermarking i...
Robust hashing is an emerging field that can be used to hash certain data types in applications unsu...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...