A digital forensics examiner often has to deal with large amounts of multimedia content during an investigation. One important part of such an investigation is to identify illegal material like pictures containing child pornography. Robust image hashing is an effective technique to help identifying known illegal images even after the original images were modified by applying various image processing operations. However, some specific operations lead to increased false negative rates when using robust image hashing. One of the most challenging operations today is image cropping. In this work we introduce an approach to counter cropping operations on images by combining image segmentation and efficient block mean image hashing. We show that w...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
The definition of valid and robust methodologies for assessing the authenticity of digital informati...
Forensic analysis of image sets today is most often done with the help of cryptographic hashes due t...
Forensic analysis of image sets today is most often done with the help of cryptographic hashes due t...
In this paper, we introduce a concept to counter the current weakness of robust hashing with respect...
Abstract. In this paper, we introduce a concept to counter the current weakness of robust hashing wi...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
With the intensively increasing of digital media new challenges has been created for authentication ...
The proliferation of digital images creates problems for managing large image databases, indexing in...
Image perceptual hashing finds applications in content indexing, large-scale image database manageme...
Image hashing is an emerging technology for the need of, such as image authentication, digital water...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
This paper proposes a blind authentication scheme to identify duplicated regions for copy-move forge...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
The definition of valid and robust methodologies for assessing the authenticity of digital informati...
Forensic analysis of image sets today is most often done with the help of cryptographic hashes due t...
Forensic analysis of image sets today is most often done with the help of cryptographic hashes due t...
In this paper, we introduce a concept to counter the current weakness of robust hashing with respect...
Abstract. In this paper, we introduce a concept to counter the current weakness of robust hashing wi...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
With the intensively increasing of digital media new challenges has been created for authentication ...
The proliferation of digital images creates problems for managing large image databases, indexing in...
Image perceptual hashing finds applications in content indexing, large-scale image database manageme...
Image hashing is an emerging technology for the need of, such as image authentication, digital water...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
This paper proposes a blind authentication scheme to identify duplicated regions for copy-move forge...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
The definition of valid and robust methodologies for assessing the authenticity of digital informati...