Perceptual hash function for scalable video

被引:0
作者
Navajit Saikia
Prabin K. Bora
机构
[1] Assam Engineering College,
[2] Indian Institute of Technology Guwahati,undefined
来源
International Journal of Information Security | 2014年 / 13卷
关键词
Perceptual hash function; Perceptual content; Content-preserving operation; Content difference; Scalable video coding; Scalability feature;
D O I
暂无
中图分类号
学科分类号
摘要
Perceptual hash functions are important for video authentication based on digital signature verifying the originality and integrity of videos. They derive hashes from the perceptual contents of the videos and are robust against the common content-preserving operations on the videos. The advancements in the field of scalable video coding call for efficient hash functions that are also robust against the temporal, spatial and bit rate scalability features of the these coding schemes. This paper presents a new algorithm to extract hashes of scalably coded videos using the 3D discrete wavelet transform. A hash of a video is computed at the group-of-frames level from the spatio-temporal low-pass bands of the wavelet-transformed groups-of-frames. For each group-of-frames, the spatio-temporal low-pass band is divided into perceptual blocks and a hash is derived from the cumulative averages of their averages. Experimental results demonstrate the robustness of the hash function against the scalability features and the common content-preserving operations as well as the sensitivity to the various types of content differences. Two critical properties of the hash function, diffusion and confusion, are also examined.
引用
收藏
页码:81 / 93
页数:12
相关论文
共 30 条
  • [1] Han S-H(2010)Content-based image authentication: current status, issues and challenges Springer Int. J. Inf. Secur. 9 19-32
  • [2] Chu C-H(2007)State-of-the-art and trends in scalable video compression with wavelet-based approaches IEEE Trans. Circuits Syst. Video Tech. 17 1238-1255
  • [3] Adami N(2007)A scalable signature scheme for video authentication Springer J. Multimed. Tools Appl. 34 107-135
  • [4] Signoroni A(2005)Robust video hashing based on radial projections of key frames IEEE Trans. Signal Process. 53 4020-4037
  • [5] Leonardi R(2006)A secure and robust authentication scheme for video transcoding IEEE Trans. Circuits Syst. Video Tech. 16 1232-1244
  • [6] Atrey PK(2006)Spatio-temporal transform based video hashing IEEE Trans. Multimed. 8 1190-1208
  • [7] Yan WQ(2005)A secure and robust digital signature scheme for JPEG2000 image authentication system IEEE Trans. Multimed. 7 480-494
  • [8] Kankanhalli MS(2003)Video transcoding architectures and techniques: an overview IEEE Signal Process. Mag. 20 18-29
  • [9] Roover CD(2000)Low bit-rate scalable video coding with 3-D set partitioning in hierarchical trees (3-D SPIHT) IEEE Trans. Circuits Syst. Video Tech. 10 1374-1387
  • [10] Vleeschouwer CD(1992)Image coding using wavelet transform IEEE Trans. Image Process. 1 205-220