Perceptual Video Hashing for Content Identification and Authentication

被引:28
|
作者
Khelifi, Fouad [1 ]
Bouridane, Ahmed [1 ]
机构
[1] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
Authentication; forgery detection; identification; robustness; video hashing; ROBUST; ALGORITHM;
D O I
10.1109/TCSVT.2017.2776159
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Perceptual hashing has been broadly used in the literature to identify similar contents for video copy detection. It has also been adopted to detect malicious manipulations for video authentication. However, targeting both applications with a single system using the same hash would be highly desirable as this saves the storage space and reduces the computational complexity. This paper proposes a perceptual video hashing system for content identification and authentication. The objective is to design a hash extraction technique that can withstand signal processing operations on one hand and detect malicious attacks on the other hand. The proposed system relies on a new signal calibration technique for extracting the hash using the discrete cosine transform (DCT) and the discrete sine transform (DST). This consists of determining the number of samples, called the normalizing shift, that is required for shifting a digital signal so that the shifted version matches a certain pattern according to DCT/DST coefficients. The rationale for the calibration idea is that the normalizing shift resists signal processing operations while it exhibits sensitivity to local tampering (i.e., replacing a small portion of the signal with a different one). While the same hash serves both applications, two different similarity measures have been proposed for video identification and authentication, respectively. Through intensive experiments with various types of video distortions and manipulations, the proposed system has been shown to outperform related state-of-the art video hashing techniques in terms of identification and authentication with the advantageous ability to locate tampered regions.
引用
收藏
页码:50 / 67
页数:18
相关论文
共 50 条
  • [31] A review of hashing based image authentication techniques
    Shaik, Abdul Subhani
    Karsh, Ram Kumar
    Islam, Mohiul
    Laskar, Rabul Hussain
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (02) : 2489 - 2516
  • [32] Perceptual hashing authentication algorithm for multi-format audio based on energy to zero ratio
    Zhang Q.
    Qiao S.
    Zhang T.
    Huang Y.
    1600, Huazhong University of Science and Technology (45): : 33 - 38
  • [33] Secure Architecture and Protocols for Robust Perceptual Hashing
    Hu, Donghui
    Su, Bin
    Zheng, Shuli
    Zhang, Zhuang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 550 - 554
  • [34] Perceptual Hashing With Visual Content Understanding for Reduced-Reference Screen Content Image Quality Assessment
    Huang, Ziqing
    Liu, Shiguang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (07) : 2808 - 2823
  • [35] High Accuracy Perceptual Video Hashing via Low-Rank Decomposition and DWT
    Chen, Lv
    Ye, Dengpan
    Jiang, Shunzhi
    MULTIMEDIA MODELING (MMM 2020), PT I, 2020, 11961 : 802 - 812
  • [36] A Fine-Grained Authentication Model Based on Perceptual Hashing and Grid Descriptor for Remote Sensing Image
    Ding, Kaimeng
    Wang, Yuhai
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES FOR RAIL TRANSPORTATION (EITRT2013), VOL II, 2014, 288 : 423 - 430
  • [37] On Security of Content-Based Video Stream Authentication
    Lo, Swee-Won
    Wei, Zhuo
    Deng, Robert H.
    Ding, Xuhua
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 366 - 383
  • [38] Unified Performance Evaluation Method for Perceptual Image Hashing
    Li, Xinran
    Qin, Chuan
    Wang, Zichi
    Qian, Zhenxing
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1404 - 1419
  • [39] A Visual Model-Based Perceptual Image Hash for Content Authentication
    Wang, Xiaofeng
    Pang, Kemu
    Zhou, Xiaorui
    Zhou, Yang
    Li, Lu
    Xue, Jianru
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1336 - 1349
  • [40] Perceptual Image Hashing Based on Virtual Watermark Detection
    Khelifi, Fouad
    Jiang, Jianmin
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2010, 19 (04) : 981 - 994