Skip to main content

Robust Hashing for Efficient Forensic Analysis of Image Sets

  • Conference paper

Abstract

Forensic analysis of image sets today is most often done with the help of cryptographic hashes due to their efficiency, their integration in forensic tools and their excellent reliability in the domain of false detection alarms. A drawback of these hash methods is their fragility to any image processing operation. Even a simple re-compression with JPEG results in an image not detectable. A different approach is to apply image identification methods, allowing identifying illegal images by e.g. semantic models or facing detection algorithms. Their common drawback is a high computational complexity and significant false alarm rates. Robust hashing is a well-known approach sharing characteristics of both cryptographic hashes and image identification methods. It is fast, robust to common image processing and features low false alarm rates. To verify its usability in forensic evaluation, in this work we discuss and evaluate the behavior of an optimized block-based hash.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cano, P., Batle, E., Kalker, T., Haitsma, J.: A review of algorithms for audio fingerprinting. In: Proceedings of the IEEE Workshop on Multimedia Signal Processing, pp. 169–173 (2002)

    Google Scholar 

  2. Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)

    Google Scholar 

  3. Roover, C.D., Vleeschouwer, C.D., Lefebvre, F., Macq, B.: Robust video hashing based on radial projections of key frames. IEEE Transactions on Signal Processing 10(10) Part 2, 4020–4037 (2005)

    Google Scholar 

  4. Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 178–183 (2000)

    Google Scholar 

  5. Zhou, X., Schmucker, M., Brown, C.L.: Video Perceptual Hashing Using Interframe Similarity. In: Sicherheit, pp. 107–110 (2006)

    Google Scholar 

  6. Liu, T., Zhang, H.-J., Qi, F.: A novel video key-frame-extraction algorithm based on perceived motion energy model. IEEE Transactions on Circuits and Systems for Video Technology 13(10), 1006–1013 (2003)

    Article  Google Scholar 

  7. Oostveen, J., Kalker, T., Haitsma, J.: Visual hashing of video: application and techniques. In: Wong, P.W., Delp III, E.P. (eds.) IS&T/SPIE 13th Int. Symposium on Electronic Imaging San Jose, Security and Watermarking of Multimedia Contents. SPIE – The International Society for Optical Engeneering, CA, USA, p. 4314 (2001)

    Google Scholar 

  8. Haitsma, J.A., Oostveen, J.C., Kalker, A.A.C.: Robust audio hashing for content identification. In: Content based Multimedia Indexing (CBMI 2001), Brescia, Italy (2001)

    Google Scholar 

  9. Allamanche, H., Helmuth, F., Kasten, C.: Content-Based Identification of Audio Material Using MPEG-7 Low Level Description. In: Electronic Proceedings of the International Symposium of Music Information Retrieval (2001), http://ismir2001.ismir.net/papers.html

  10. Schneier, B.W.: Applied Cryptography, 2nd edn., ch. 18. Wiley (1996)

    Google Scholar 

  11. Zauner, C., Steinebach, M., Hermann, E.: Rihamark: Perceptual Image Hash Benchmarking. In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII (2011)

    Google Scholar 

  12. Yang, B., Gu, F., Niu, X.: Block mean value based image perceptual hashing. In: Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Multimedia Signal Processing (IIHMSP), pp. 167–172. IEEE (2006) ISBN 0-7695-2745-0

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Steinebach, M. (2012). Robust Hashing for Efficient Forensic Analysis of Image Sets. In: Gladyshev, P., Rogers, M.K. (eds) Digital Forensics and Cyber Crime. ICDF2C 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35515-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35515-8_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35514-1

  • Online ISBN: 978-3-642-35515-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics