Perceptual video hashing robust against geometric distortions

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Iterative Geometric Methods for Robust Perceptual Image Hashing

We propose a novel and robust hashing paradigm that uses iterative geometric techniques and relies on observations that main geometric features within an image would approximately stay invariant under small perturbations. A key goal of this algorithm is to produce sufficiently randomized outputs which are unpredictable, thereby yielding properties akin to cryptographic MACs. This is a key compo...

متن کامل

A Robust Zero-watermarking Algorithm Against Geometric Attacks with Perceptual Hashing

Taking into account the information security problem in medical image, the paper put forward a new robust zerowatermarking algorithm with three-dimensional (3D) discrete Fourier transform (DFT) and perceptual hashing. The medical volume data was made by 3D DFT. The zero-watermarking algorithm selected the real part of 3D DFT coefficients (4*4*4) to generate the watermarking extraction key seque...

متن کامل

Oblivious Image Watermarking Robust against Scaling and Geometric Distortions

Watermarking stays the main technical safeguard of electronic copyright. This paper presents the first public-domain oblivious watermarking scheme for images which survives scaling and geometric distortion attacks. Previous proposals are either proprietary, nonoblivious or require scaling or geometric distortion to be undone prior to mark recovery, which may not be practical in oblivious waterm...

متن کامل

On security threats for robust perceptual hashing

Perceptual hashing has to deal with the constraints of robustness, accuracy and security. After modeling the process of hash extraction and the properties involved in this process, two different security threats are studied, namely the disclosure of the secret feature space and the tampering of the hash. Two different approaches for performing robust hashing are presented: Random-Based Hash (RB...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science China Information Sciences

سال: 2012

ISSN: 1674-733X,1869-1919

DOI: 10.1007/s11432-011-4450-1