SECURITY EVALUATION OF A PERCEPTUAL IMAGE HASHING SCHEME BASED ON VIRTUAL WATERMARK DETECTION

被引:0
作者
Zhou, Jiantao [1 ,2 ]
Au, Oscar C. [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept ECE, Hong Kong, Hong Kong, Peoples R China
[2] McMaster Univ, Dept ECE, Hamilton, ON, Canada
来源
2011 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME) | 2011年
关键词
Perceptual image hashing; image authentication; multimedia security; convex optimization; ROBUST;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper evaluates the security of a recently proposed perceptual image hashing scheme based on virtualwatermark detection. Under the known-hash attack where the attacker has access to several image/hash vector pairs, we show that the task of estimating the virtual watermark sequences serving as the secret key can be formulated as a simple convex optimization problem, and hence, can be solved efficiently. More specifically, we demonstrate that satisfactory level of estimation accuracy of a watermark sequence of length m could be achieved from approximately 2 . m image/hash vector pairs on average. Experimental results using artificial data and real image data are also provided to verify the effectiveness of our proposed attack approaches.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Robust Perceptual Image Hashing Based on Ring Partition and NMF
    Tang, Zhenjun
    Zhang, Xianquan
    Zhang, Shichao
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (03) : 711 - 724
  • [22] REDUCED-REFERENCE IMAGE QUALITY ASSESSMENT BASED ON PERCEPTUAL IMAGE HASHING
    Lv, Xudong
    Wang, Z. Jane
    2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 4361 - 4364
  • [23] Perceptual Image Hashing Using SVD Based Noise Resistant Local Binary Pattern
    Abbas, Syed Qasim
    Ahmed, Fawad
    Zivic, Natasa
    Ur-Rehman, Obaid
    2016 8TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2016, : 401 - 407
  • [24] Image perceptual hashing for content authentication based on Watson's visual model and LLE
    Xing, Huifen
    Che, Hui
    Wu, Qilin
    Wang, Honghai
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2023, 20 (01)
  • [25] PIHA: Detection method using perceptual image hashing against query-based adversarial attacks
    Choi, Seok-Hwan
    Shin, Jinmyeong
    Choi, Yoon-Ho
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 145 : 563 - 577
  • [26] A secure image authentication scheme based on dual fragile watermark
    Gong, Xinhui
    Chen, Lei
    Yu, Feng
    Zhao, Xiaohong
    Wang, Shihong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (25-26) : 18071 - 18088
  • [27] A secure image authentication scheme based on dual fragile watermark
    Xinhui Gong
    Lei Chen
    Feng Yu
    Xiaohong Zhao
    Shihong Wang
    Multimedia Tools and Applications, 2020, 79 : 18071 - 18088
  • [28] Perceptual Image Hashing Based on Shape Contexts and Local Feature Points
    Lv, Xudong
    Wang, Z. Jane
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1081 - 1093
  • [29] Medical Image Watermarking Based on SIFT-DCT Perceptual Hashing
    Liu, Jialing
    Li, Jingbing
    Chen, Jing
    Zou, Xiangxi
    Cheng, Jieren
    Liu, Jing
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 334 - 345
  • [30] Perceptual image hashing based on structural fractal features of image coding and ring partition
    Fares Khelaifi
    HongJie He
    Multimedia Tools and Applications, 2020, 79 : 19025 - 19044