A Secure Perceptual Hash Algorithm for Image Content Authentication

被引:0
|
作者
Weng, Li [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC IBBT, Louvain, Belgium
来源
关键词
ROBUST; PHASE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perceptual hashing is a promising solution to image content authentication. However, conventional image hash algorithms only offer a limited authentication level for the protection of overall content. In this work, we propose an image hash algorithm with block level content protection. It extracts features from DFT coefficients of image blocks. Experiments show that the hash has strong robustness against JPEG compression, scaling, additive white Gaussian noise, and Gaussian smoothing. The hash value is compact, and highly dependent on a key. It has very efficient trade-offs between the false positive rate and the true positive rate.
引用
收藏
页码:108 / 121
页数:14
相关论文
共 50 条
  • [21] Binary document image watermarking for secure authentication using perceptual modeling
    Puhan, NB
    Ho, ATS
    2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2, 2005, : 393 - 398
  • [22] Detecting similarity in color images based on perceptual image hash algorithm
    Ali, Nada Hussein M.
    Mahdi, Marwa Emad
    4TH INTERNATIONAL CONFERENCE ON BUILDINGS, CONSTRUCTION AND ENVIRONMENTAL ENGINEERING, 2020, 737
  • [23] An Image Perceptual Hash Algorithm Based on Bidirectional Generative Adversarial Network
    Ma B.
    Wang Y.-L.
    Xu J.
    Wang C.-P.
    Li J.
    Zhou L.-N.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (05): : 1405 - 1412
  • [24] Least Significant Bit Hash Algorithm for Digital Image Watermarking Authentication
    Muyco, Stella D.
    Hernandez, Alexander A.
    ICCAI '19 - PROCEEDINGS OF THE 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE, 2019, : 150 - 154
  • [25] Secure Hash Authentication in IoT based Applications
    Sharma, Nishant
    Sultana, Parveen H.
    Singh, Rahul
    Patil, Shriniwas
    2ND INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING ICRTAC -DISRUP - TIV INNOVATION , 2019, 2019, 165 : 328 - 335
  • [26] A Study and analysis on a perceptual image hash algorithm based on invariant moments
    Hu, Bin
    Sensors and Transducers, 2013, 159 (11): : 337 - 344
  • [27] A multiple watermarks algorithm for image content authentication
    蔡立军
    李睿
    易叶青
    Journal of Central South University, 2012, 19 (10) : 2866 - 2874
  • [28] A multiple watermarks algorithm for image content authentication
    Li-jun Cai
    Rui Li
    Ye-qing Yi
    Journal of Central South University, 2012, 19 : 2866 - 2874
  • [29] A multiple watermarks algorithm for image content authentication
    Cai Li-jun
    Li Rui
    Yi Ye-qing
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2012, 19 (10) : 2866 - 2874
  • [30] SHA - THE SECURE HASH ALGORITHM
    STALLINGS, W
    DR DOBBS JOURNAL, 1994, 19 (04): : 32 - &