Spatio-temporal transform based video hashing

被引:139
作者
Coskun, Baris
Sankur, Bulent
Memon, Nasir
机构
[1] Polytech Univ, Dept Elect & Comp Engn, Brooklyn, NY 11201 USA
[2] Bogazici Univ, Dept Elect Engn, Istanbul, Turkey
关键词
broadcast monitoring; multimedia content authentication; robust hash; video database indexing; video hash;
D O I
10.1109/TMM.2006.884614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identification and verification of a video clip via its fingerprint find applications in video browsing, database search and security. For this purpose, the video sequence must be collapsed into a short fingerprint using a robust hash function based on signal processing operations. We propose two robust hash algorithms for video based both on the Discrete Cosine Transform (DCT), one on the classical basis set and the other on a novel randomized basis set (RBT). The robustness and randomness properties of the proposed hash functions are investigated in detail. It is found that these hash functions are resistant to signal processing and transmission impairments, and therefore can be instrumental in building database search, broadcast monitoring and watermarking applications for video. The DCT hash is more robust, but lacks security aspect, as it is easy to find different video clips with the same hash value. The RBT based hash, being secret key based, does not allow this and is more secure at the cost of a slight loss in the receiver operating curves.
引用
收藏
页码:1190 / 1208
页数:19
相关论文
共 21 条
  • [1] Bhattacharjee S, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P435, DOI 10.1109/ICIP.1998.723518
  • [2] CASPI Y, 2004, ICIP 04 SING OCT
  • [3] DAgostino RB, 1986, Goodness-of-fit-techniques, V68
  • [4] Dubes R., 1980, ADV COMPUT, V19, P113
  • [5] Fridrich J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P178, DOI 10.1109/ITCC.2000.844203
  • [6] FRIDRICH J, 1998, 2 INT HID WORKSH POR
  • [7] Johnson M, 2003, P IEEE INT C IM PROC
  • [8] LEFEBVRE F, 2003, IEEE ICIP BARC SPAIN
  • [9] A robust image authentication method distinguishing JPEG compression from malicious manipulation
    Lin, CY
    Chang, SF
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) : 153 - 168
  • [10] MIHCAK MK, 2001, P DIG RIGHTS MAN WOR