Perceptual Video Hashing for Content Identification and Authentication

被引:28
|
作者
Khelifi, Fouad [1 ]
Bouridane, Ahmed [1 ]
机构
[1] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
Authentication; forgery detection; identification; robustness; video hashing; ROBUST; ALGORITHM;
D O I
10.1109/TCSVT.2017.2776159
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Perceptual hashing has been broadly used in the literature to identify similar contents for video copy detection. It has also been adopted to detect malicious manipulations for video authentication. However, targeting both applications with a single system using the same hash would be highly desirable as this saves the storage space and reduces the computational complexity. This paper proposes a perceptual video hashing system for content identification and authentication. The objective is to design a hash extraction technique that can withstand signal processing operations on one hand and detect malicious attacks on the other hand. The proposed system relies on a new signal calibration technique for extracting the hash using the discrete cosine transform (DCT) and the discrete sine transform (DST). This consists of determining the number of samples, called the normalizing shift, that is required for shifting a digital signal so that the shifted version matches a certain pattern according to DCT/DST coefficients. The rationale for the calibration idea is that the normalizing shift resists signal processing operations while it exhibits sensitivity to local tampering (i.e., replacing a small portion of the signal with a different one). While the same hash serves both applications, two different similarity measures have been proposed for video identification and authentication, respectively. Through intensive experiments with various types of video distortions and manipulations, the proposed system has been shown to outperform related state-of-the art video hashing techniques in terms of identification and authentication with the advantageous ability to locate tampered regions.
引用
收藏
页码:50 / 67
页数:18
相关论文
共 50 条
  • [41] PERCEPTUAL IMAGE HASHING BASED ON WEIGHTED LLE AND FMT
    Aryan, Jamaluddin
    Wei, Guo
    Abdullahi, Sani M.
    2019 16TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICWAMTIP), 2019, : 311 - 316
  • [42] Deep Video Hashing
    Liong, Venice Erin
    Lu, Jiwen
    Tan, Yap-Peng
    Zhou, Jie
    IEEE TRANSACTIONS ON MULTIMEDIA, 2017, 19 (06) : 1209 - 1219
  • [43] Content Authentication of Halftone Video via Flickering as Sparse Signal
    Hsu, Chao-Yung
    Lu, Chun-Shien
    Pei, Soo-Chang
    2012 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2012), 2012, : 265 - 268
  • [44] GENERIC ATTACKS ON CONTENT-BASED VIDEO STREAM AUTHENTICATION
    Lo, Swee-Won
    Wei, Zhuo
    Ding, Xuhua
    Deng, Robert H.
    2014 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO WORKSHOPS (ICMEW), 2014,
  • [45] Video hashing based on appearance and attention features fusion via DBN
    Sun, Jiande
    Liu, Xiaocui
    Wan, Wenbo
    Li, Jing
    Zhao, Dong
    Zhang, Huaxiang
    NEUROCOMPUTING, 2016, 213 : 84 - 94
  • [46] Perceptual Hashing With Deep and Texture Features
    Yu, Mengzhu
    Tang, Zhenjun
    Liang, Xiaoping
    Zhang, Xianquan
    Zhang, Xinpeng
    IEEE MULTIMEDIA, 2024, 31 (01) : 65 - 75
  • [47] PERCEPTUAL IMAGE HASHING BASED ON THE ERROR DIFFUSION HALFTONE MECHANISM
    Qin, Chuan
    Chang, Chin-Chen
    Tsou, Pei-Ling
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (09): : 6161 - 6172
  • [48] Perceptual Image Hashing With Locality Preserving Projection for Copy Detection
    Huang, Ziqing
    Tang, Zhenjun
    Zhang, Xianquan
    Ruan, Linlin
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 463 - 477
  • [49] A DCT-VQ BASED MULTIPURPOSE IMAGE HASHING SCHEME FOR COPYRIGHT PROTECTION AND CONTENT AUTHENTICATION
    Yu, Fa-Xin
    Lu, Zhe-Ming
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (09): : 2703 - 2710
  • [50] A Survey on Image Hashing for Image Authentication
    Ou, Yang
    Rhee, Kyung Hyune
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (05): : 1020 - 1030