z-logo
open-access-imgOpen Access
Robust and secure image hashing
Author(s) -
A. Swaminathan,
Yinian Mao,
Min Wu
Publication year - 2006
Publication title -
ieee transactions on information forensics and security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.613
H-Index - 133
eISSN - 1556-6021
pISSN - 1556-6013
DOI - 10.1109/tifs.2006.873601
Subject(s) - signal processing and analysis , computing and processing , communication, networking and broadcast technologies
Image hash functions find extensive applications in content authentication, database search, and watermarking. This paper develops a novel algorithm for generating an image hash based on Fourier transform features and controlled randomization. We formulate the robustness of image hashing as a hypothesis testing problem and evaluate the performance under various image processing operations. We show that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions. We introduce a general framework to study and evaluate the security of image hashing systems. Under this new framework, we model the hash values as random variables and quantify its uncertainty in terms of differential entropy. Using this security framework, we analyze the security of the proposed schemes and several existing representative methods for image hashing. We then examine the security versus robustness tradeoff and show that the proposed hashing methods can provide excellent security and robustness.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom