SECURITY EVALUATION OF A PERCEPTUAL IMAGE HASHING SCHEME BASED ON VIRTUAL WATERMARK DETECTION

被引:0
作者
Zhou, Jiantao [1 ,2 ]
Au, Oscar C. [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept ECE, Hong Kong, Hong Kong, Peoples R China
[2] McMaster Univ, Dept ECE, Hamilton, ON, Canada
来源
2011 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME) | 2011年
关键词
Perceptual image hashing; image authentication; multimedia security; convex optimization; ROBUST;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper evaluates the security of a recently proposed perceptual image hashing scheme based on virtualwatermark detection. Under the known-hash attack where the attacker has access to several image/hash vector pairs, we show that the task of estimating the virtual watermark sequences serving as the secret key can be formulated as a simple convex optimization problem, and hence, can be solved efficiently. More specifically, we demonstrate that satisfactory level of estimation accuracy of a watermark sequence of length m could be achieved from approximately 2 . m image/hash vector pairs on average. Experimental results using artificial data and real image data are also provided to verify the effectiveness of our proposed attack approaches.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Perceptual Image Hashing Based on Virtual Watermark Detection
    Khelifi, Fouad
    Jiang, Jianmin
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2010, 19 (04) : 981 - 994
  • [2] The Analysis of an NMF-based Perceptual Image Hashing Scheme
    Hossein, S. Amir
    Tabatabaei, A. E.
    Ruland, Christoph
    2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 108 - 112
  • [3] Security and privacy protocols for perceptual image hashing
    Hu, Donghui
    Su, Bin
    Zheng, Shuli
    Zhao, Zhong-Qiu
    Wu, Xintao
    Wu, Xindong
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (03) : 146 - 162
  • [4] Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme
    Zhang Qiu-yu
    Ren Zhan-wei
    Huang Yi-bo
    Yu Shuang
    Hu Wen-jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 229 - 240
  • [5] A perceptual image hashing algorithm for hybrid document security
    Eskenazi, Sebastien
    Bodin, Boris
    Gomez-Kramer, Petra
    Ogier, Jean-Marc
    2017 14TH IAPR INTERNATIONAL CONFERENCE ON DOCUMENT ANALYSIS AND RECOGNITION (ICDAR), VOL 1, 2017, : 741 - 746
  • [6] Perceptual audio hashing algorithm based on Zernike moment and maximum-likelihood watermark detection
    Chen, Ning
    Xiao, Hai-dong
    DIGITAL SIGNAL PROCESSING, 2013, 23 (04) : 1216 - 1227
  • [7] Secure Perceptual Hashing Scheme for Image using Encryption
    Sahana, M. S.
    Geetha, M. N.
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 534 - 538
  • [8] Analysis of the Security of Perceptual Image Hashing Based on Non-Negative Matrix Factorization
    Khelifi, Fouad
    Jiang, Jianmin
    IEEE SIGNAL PROCESSING LETTERS, 2010, 17 (01) : 43 - 46
  • [9] Analysis of Perceptual Hashing Algorithms in Image Manipulation Detection
    Samanta, Priyanka
    Jain, Shweta
    BIG DATA, IOT, AND AI FOR A SMARTER FUTURE, 2021, 185 : 203 - 212
  • [10] A clustering based approach to perceptual image hashing
    Monga, Vishal
    Banerjee, Arindam
    Evans, Brian L.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) : 68 - 79