2010
DOI: 10.1109/tip.2009.2038637
|View full text |Cite
|
Sign up to set email alerts
|

Perceptual Image Hashing Based on Virtual Watermark Detection

Abstract: This paper proposes a new robust and secure perceptual image hashing technique based on virtual watermark detection. The idea is justified by the fact that the watermark detector responds similarly to perceptually close images using a non embedded watermark. The hash values are extracted in binary form with a perfect control over the probability distribution of the hash bits. Moreover, a key is used to generate pseudo-random noise whose real values contribute to the randomness of the feature vector with a sign… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 95 publications
(39 citation statements)
references
References 31 publications
0
38
0
1
Order By: Relevance
“…• Statistic-based schemes (Khelifi & Jiang, 2010;Schneider & Chang, 1996;Venkatesan et al, 2000): This group of schemes extracts hash features by calculating the images statistics in the spacial domain, such as mean, variance, higher moments of image blocks and histogram.…”
Section: Perceptual Image Hashing Methods Classificationmentioning
confidence: 99%
“…• Statistic-based schemes (Khelifi & Jiang, 2010;Schneider & Chang, 1996;Venkatesan et al, 2000): This group of schemes extracts hash features by calculating the images statistics in the spacial domain, such as mean, variance, higher moments of image blocks and histogram.…”
Section: Perceptual Image Hashing Methods Classificationmentioning
confidence: 99%
“…This confirms the suitability of the identification distance for this particular application. The reason that TIRI exhibits good efficiency under geometric distortions is partly due to the fact that the DCT-based features are extracted from overlapping blocks which have been shown to offer more robustness than non overlapping blocks in [34]. It can be seen from Fig.…”
Section: B Identification Performancementioning
confidence: 99%
“…We acknowledge a related work on still images using feature points [33] where the system has been shown to deliver better authentication results when compared to transform-based hashing techniques (DWT and DCT). The identification results, however, have been outperformed by other techniques, including the waveletbased hashing technique, as demonstrated in [34] on attacked images. Furthermore, the system assumes that the tampered regions provide a mismatch of several extracted feature points.…”
Section: Introductionmentioning
confidence: 99%
“…Existing algorithms generally differ in two aspects: 1) whether particular features are required; 2) whether training is required. Perceptual hashing [9] mainly deals with the latter two applications. Corresponding algorithms are typically feature-dependent, and do not require training.…”
Section: Introductionmentioning
confidence: 99%