Abstract
Each multimedia content can exist in different versions, e.g. different compression rates. Thus, cryptographic hash functions cannot be used for multimedia content identification or verification as they are sensitive to bit flips. In this case, perceptual hash functions that consider perceptual similarity apply. This article describes some of the different existing approaches for video data. One algorithm based on spatio-temporal color difference is investigated. The article shows how this method can be improved by using a simple similarity measure. We analyze the performance of the new method and compare it with the original method. The proposed algorithm shows increased reliability of video identification both in robustness and discriminating capabilities.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Serepth, C.J., Uhl, A.: Robust hash function for visual data: an experimental comparison (2003)
De Roover, C., De Vleeschouwer, C., Lefebvre, F., Macq, B.: Key-frame radial projection for robust video hashing (2004)
Venkatesan, R., Koon, S.-M., Jakubowski, M.H., Moulin, P.: Robust image hashing (2000)
Fotopoulos, V., Skodras, A.N.: A new fingerprinting method for digital images (2000)
Mucedero, A., Lancini, R., Mapelli, F.: A novel hashing algorithm for video sequences (2004)
Caspi, Y., Bargeron, D.: Sharing video annotations (2004)
Oostveen, J., Kalker, T., Haitsma, J.: Visual hashing of digital video: applications and techniques (2001)
Cheung, S.-c.S., Zakhor, A.: Efficient Video Similarity Measurement with Video Signature (2003)
Oostveen, J., Kalker, T., Haitsma, J.: Feature Extraction and a Database Strategy for Video Fingerprint (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, X., Schmucker, M., Brown, C.L. (2005). Perceptual Hashing of Video Content Based on Differential Block Similarity. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_12
Download citation
DOI: https://doi.org/10.1007/11596981_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)