Skip to main content

New Iterative Geometric Methods for Robust Perceptual Image Hashing

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2320))

Abstract

We propose a novel and robust hashing paradigm that uses iterative geometric techniques and relies on observations that main geometric features within an image would approximately stay invariant under small perturbations. A key goal of this algorithm is to produce sufficiently randomized outputs which are unpredictable, thereby yielding properties akin to cryptographic MACs. This is a key component for robust multimedia identification and watermarking (for synchronization as well as content dependent key generation). Our algorithm withstands standard benchmark (e.g Stirmark) attacks provided they do not cause severe perceptually significant distortions. As verified by our detailed experiments, the approach is relatively media independent and works for audio as well.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. E. Knuth, The Art of Computer Programming, Addison-Wesley, 1998.

    Google Scholar 

  2. R. Venkatesan, S.-M. Koon, M. Jakubowski and P. Moulin, “Robust image hashing,” Proc. IEEE ICIP, Vancouver, Canada, September 2000.

    Google Scholar 

  3. M. K. Mıhçak and R. Venkatesan, “A Perceptual Audio Hashing Algorithm,” preprint, 2000.

    Google Scholar 

  4. F. A. P. Petitcolas and R. J. Anderson, “Evaluation of copyright marking systems,” Proceedings of IEEE Multimedia Systems’99, vol. 1, pp. 574–579, 7–11 June 1999, Florence, Italy.

    Google Scholar 

  5. M. K. Mıhçak and R. Venkatesan, “Video Watermarking Using Image Hashing,” preprint, 2000.

    Google Scholar 

  6. A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of applied cryptography, CRC Press, Boca Raton, FL, 1997.

    MATH  Google Scholar 

  7. N. G. Kingsbury, “Complex wavelets for shift invariant analysis and filtering of signals,” submitted to Journal of Applied Computation and Harmonic Analysis, June 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mıhçak, M.K., Venkatesan, R. (2002). New Iterative Geometric Methods for Robust Perceptual Image Hashing. In: Sander, T. (eds) Security and Privacy in Digital Rights Management. DRM 2001. Lecture Notes in Computer Science, vol 2320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47870-1_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-47870-1_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43677-5

  • Online ISBN: 978-3-540-47870-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics