Perceptual hashing has to deal with the constraints of robustness, accuracy and security. After modeling the process of hash extraction and the properties involved in this process, two different security threats are studied, namely the disclosure of the secret feature space and the tampering of the hash. Two different approaches for performing robust hashing are presented: Random-Based Hash (RBH) where the security is achieved using a random projection matrix and Content-Based Hash (CBH) were the security relies on the difficulty to tamper the hash. As for digital watermarking, different security setups are also devised: the Batch Hash Attack, the Group Hash Attack, the Unique Hash Attack and the Sensitivity Attack. A theoretical analysis o...
Robust hashing is an emerging field that can be used to hash certain data types in applications unsu...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
The proliferation of digital images creates problems for managing large image databases, indexing in...
ISBN 9780819475046International audiencePerceptual hashing has to deal with the constraints of robus...
Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for auto...
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robus...
This paper develops a joint hashing/watermarking scheme in which a short hash of the host signal is ...
a b s t r a c t Perceptual hashing is conventionally used for content identification and authenticat...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
Perceptual hashing is a solution for persistent content identification and robust content authentica...
Perceptual hashing is a promising tool for multimedia content authentication. Digital watermarking i...
Although hash functions are a well-known method in computer science to map arbitrary large data to b...
Robust hashing is an emerging field that can be used to hash certain data types in applications unsu...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
The proliferation of digital images creates problems for managing large image databases, indexing in...
ISBN 9780819475046International audiencePerceptual hashing has to deal with the constraints of robus...
Robust hash algorithms can be used as tools for identifying or discriminating content, e.g. for auto...
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robus...
This paper develops a joint hashing/watermarking scheme in which a short hash of the host signal is ...
a b s t r a c t Perceptual hashing is conventionally used for content identification and authenticat...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...
This paper proposes a new robust and secure perceptual image hashing technique based on virtual wate...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Hash functions are frequently called message digest functions. Their purpose is to extract a short ...
Perceptual hashing is a solution for persistent content identification and robust content authentica...
Perceptual hashing is a promising tool for multimedia content authentication. Digital watermarking i...
Although hash functions are a well-known method in computer science to map arbitrary large data to b...
Robust hashing is an emerging field that can be used to hash certain data types in applications unsu...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
The proliferation of digital images creates problems for managing large image databases, indexing in...