Robust image hash in Radon transform domain for authentication

Y Lei, Y Wang, J Huang - Signal Processing: Image Communication, 2011 - Elsevier
Image authentication has become an emergency issue in the digital world as it can be easily
tampered with the image editing techniques. In this paper, a novel robust hashing method …

Secure and robust two-phase image authentication

SAH Tabatabaei, O Ur-Rehman… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A novel two-phase robust content-based image authentication scheme is introduced. The
proposed scheme is constructed based on a combination of hard and soft authentication …

Compact video fingerprinting via structural graphical models

M Li, V Monga - IEEE transactions on information forensics and …, 2013 - ieeexplore.ieee.org
Much previous work in video fingerprinting has focused on robustness and security issues,
but the compactness requirement, ie, the hash should be of a short length with acceptable …

[PDF][PDF] 融合时空域变化信息的视频感知哈希算法研究

文振, 高金花, 朱映映, 杜以华, 邓良太 - 电子学报, 2014 - ejournal.org.cn
感知哈希(Perceptual Hashing) 是多媒体数据集到摘要集的单向映射, 为多媒体数字内容的标识,
检索, 认证等应用提供了安全可靠的技术支撑. 本文提出一种融合视觉感知及时空域特征的视频 …

On the difficulty of hiding keys in neural networks

T Kupek, C Pasquini, R Böhme - … of the 2020 ACM Workshop on …, 2020 - dl.acm.org
In order to defend neural networks against malicious attacks, recent approaches propose
the use of secret keys in the training or inference pipelines of learning systems. While this …

Catalog integration made easy

PJ Marrón, G Lausen, M Weber - 2003 - dl.gi.de
In this paper, we study adaptive evaluation techniques for querying XML-based electronic
catalogs, and show, by means of experiments performed on real-world catalogs, that our …

Secure architecture and protocols for robust perceptual hashing

D Hu, B Su, S Zheng, Z Zhang - 2013 Ninth International …, 2013 - ieeexplore.ieee.org
This paper proposes a new architecture for the secure application of robust perceptual
hashing. Protocols based on architecture of four parties are designed to ensure that no party …

Security evaluation of a perceptual image hashing scheme based on virtual watermark detection

J Zhou, OC Au - 2011 IEEE International Conference on …, 2011 - ieeexplore.ieee.org
This paper evaluates the security of a recently proposed perceptual image hashing scheme
based on virtual watermark detection. Under the known-hash attack where the attacker has …

Perceptual Image Hashing Technique for Image Authentication in WMSNs

J Shin, C Ruland - Robust Image Authentication in the Presence of Noise, 2015 - Springer
Due to the advances in wireless networking and mobile computing techniques, multimedia
data are often distributed through unreliable wireless channels where packet losses or …

Random Gray code and its performance analysis for image hashing

G Zhu, S Kwong, J Huang, J Yang - Signal processing, 2011 - Elsevier
The discrete-binary conversion stage, which plays the role of converting quantized hash
vectors into binary hash strings by encoding, is one of the most important parts of …