메뉴 건너뛰기




Volumn 1, Issue 2, 2006, Pages 215-230

Robust and secure image hashing

Author keywords

Differential entropy; Image authentication; Image hashing; Multimedia security

Indexed keywords

DIFFERENTIAL ENTROPY; IMAGE AUTHENTICATION; IMAGE HASHING; MULTIMEDIA SECURITY;

EID: 33744764278     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2006.873601     Document Type: Article
Times cited : (525)

References (44)
  • 5
    • 0010800239 scopus 로고    scopus 로고
    • A tool for robust audio information hiding: A perceptual audio hashing algorithm
    • Pittsburgh, PA, Apr.
    • M. K. Mihçak and R. Venkatesan, "A tool for robust audio information hiding: A perceptual audio hashing algorithm," in Proc. 4th Int. Information Hiding Workshop, Pittsburgh, PA, Apr. 2001.
    • (2001) Proc. 4th Int. Information Hiding Workshop
    • Mihçak, M.K.1    Venkatesan, R.2
  • 7
    • 18744436068 scopus 로고    scopus 로고
    • Multimedia content authentication: Fundamental limits
    • Rochester, NY, Sep.
    • E. Martinen and G. W. Wornell, "Multimedia content authentication: fundamental limits," in Proc. IEEE Int. Conf. Image Processing, Rochester, NY, Sep. 2002, vol. 2, pp. 17-20.
    • (2002) Proc. IEEE Int. Conf. Image Processing , vol.2 , pp. 17-20
    • Martinen, E.1    Wornell, G.W.2
  • 9
    • 0003302360 scopus 로고    scopus 로고
    • Public watermarks and resistance to tampering
    • Santa Barbara, CA, Oct.
    • I. J. Cox and J.-P. M. G. Linnartz, "Public watermarks and resistance to tampering," in Proc. IEEE Int. Conf. Image Processing, Santa Barbara, CA, Oct. 1997, vol. 3, pp. 3-6.
    • (1997) Proc. IEEE Int. Conf. Image Processing , vol.3 , pp. 3-6
    • Cox, I.J.1    Linnartz, J.-P.M.G.2
  • 10
    • 4544313881 scopus 로고    scopus 로고
    • Design and statistical analysis of a hashaided image watermarking system
    • Oct.
    • J. Cannons and P. Moulin, "Design and statistical analysis of a hashaided image watermarking system," IEEE Trans. Image Process., vol. 13, no. 10, pp. 1393-1408, Oct. 2004.
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.10 , pp. 1393-1408
    • Cannons, J.1    Moulin, P.2
  • 12
    • 13144275283 scopus 로고    scopus 로고
    • Statistical invisibility for collusion-resistant digital video watermarking
    • Feb.
    • K. Su, D. Kundur, and D. Hatzinakos, "Statistical invisibility for collusion-resistant digital video watermarking," IEEE Trans. Multimedia, vol. 7, no. 1, pp. 43-51, Feb. 2004.
    • (2004) IEEE Trans. Multimedia , vol.7 , Issue.1 , pp. 43-51
    • Su, K.1    Kundur, D.2    Hatzinakos, D.3
  • 15
    • 33744719212 scopus 로고    scopus 로고
    • Security of feature extraction in image hashing
    • Philadelphia, PA, Mar.
    • _, "Security of feature extraction in image hashing," in Proc. IEEE Int. Conf. Acoustic, Speech Signal Processing, Philadelphia, PA, Mar. 2005.
    • (2005) Proc. IEEE Int. Conf. Acoustic, Speech Signal Processing
  • 17
    • 13344261646 scopus 로고    scopus 로고
    • RASH: RAdon soft hash algorithm
    • Toulouse, France
    • F. Lefbvre, B. Macq, and J.-D. Legat, "RASH: RAdon Soft Hash algorithm," in Proc. EUSIPCO, Toulouse, France, 2002.
    • (2002) Proc. EUSIPCO
    • Lefbvre, F.1    Macq, B.2    Legat, J.-D.3
  • 18
    • 0035362493 scopus 로고    scopus 로고
    • Approximate image message authentication codes
    • Jun.
    • L. Xie, G. R. Arce, and R. F. Graveman, "Approximate image message authentication codes," IEEE Trans. Multimedia, vol. 3, no. 2, pp. 242-252, Jun. 2001.
    • (2001) IEEE Trans. Multimedia , vol.3 , Issue.2 , pp. 242-252
    • Xie, L.1    Arce, G.R.2    Graveman, R.F.3
  • 19
    • 0344703991 scopus 로고    scopus 로고
    • A robust soft hash algorithm or digital image signature
    • Barcelona, Spain, Sep.
    • F. Lefbvre, J. Czyz, and B. Macq, "A robust soft hash algorithm or digital image signature," in Proc. IEEE Int. Conf. Image Processing, Barcelona, Spain, Sep. 2003, vol. 2, pp. 495-498.
    • (2003) Proc. IEEE Int. Conf. Image Processing , vol.2 , pp. 495-498
    • Lefbvre, F.1    Czyz, J.2    Macq, B.3
  • 20
    • 20444500587 scopus 로고    scopus 로고
    • Robust perceptual image hashing via matrix invariants
    • Singapore, Oct.
    • S. S. Kozat, R. Venkatesan, and M. K. Mihçak, "Robust perceptual image hashing via matrix invariants," in Proc. IEEE Int. Conf. Image Processing, Singapore, Oct. 2004, vol. 5, pp. 3443-3446.
    • (2004) Proc. IEEE Int. Conf. Image Processing , vol.5 , pp. 3443-3446
    • Kozat, S.S.1    Venkatesan, R.2    Mihçak, M.K.3
  • 21
    • 33744760329 scopus 로고    scopus 로고
    • The randlet transform: Applications to universal perceptual hashing and image authentication
    • Monticello, IL
    • M. Malkin and R. Venkatesan, "The randlet transform: Applications to universal perceptual hashing and image authentication," in Proc. Allerton Conf., Monticello, IL, 2004.
    • (2004) Proc. Allerton Conf.
    • Malkin, M.1    Venkatesan, R.2
  • 23
    • 20444464472 scopus 로고    scopus 로고
    • Robust perceptual image hashing using feature points
    • Singapore, Oct.
    • V. Monga and B. L. Evans, "Robust perceptual image hashing using feature points," in Proc. IEEE Int. Conf. Image Processing, Singapore, Oct. 2004.
    • (2004) Proc. IEEE Int. Conf. Image Processing
    • Monga, V.1    Evans, B.L.2
  • 24
    • 0030409375 scopus 로고    scopus 로고
    • A robust content based digital signature for image authentication
    • Lausanne, Switzerland, Sep.
    • M. Schneider and S.-F. Chang, "A robust content based digital signature for image authentication," in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Sep. 1996, vol. 3, pp. 227-230.
    • (1996) Proc. IEEE Int. Conf. Image Processing , vol.3 , pp. 227-230
    • Schneider, M.1    Chang, S.-F.2
  • 25
    • 0036563560 scopus 로고    scopus 로고
    • Robust color histogram descriptors for video segment retrieval and identification
    • May
    • A. M. Ferman, A. M. Tekalp, and R. Mehrotra, "Robust color histogram descriptors for video segment retrieval and identification," IEEE Trans. Image Process., vol. 11, no. 5, pp. 497-508, May 2002.
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.5 , pp. 497-508
    • Ferman, A.M.1    Tekalp, A.M.2    Mehrotra, R.3
  • 26
    • 2442604338 scopus 로고    scopus 로고
    • An efficient and effective region-based image retrieval framework
    • May
    • F. Jing, M. Li, H.-J. Zhang, and B. Zhang, "An efficient and effective region-based image retrieval framework," IEEE Trans. Image Process., vol. 13, no. 5, pp. 699-709, May 2004.
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.5 , pp. 699-709
    • Jing, F.1    Li, M.2    Zhang, H.-J.3    Zhang, B.4
  • 28
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Feb.
    • C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technology, vol. 11, no. 2, pp. 153-168, Feb. 2001.
    • (2001) IEEE Trans. Circuits Syst. Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.-Y.1    Chang, S.-F.2
  • 29
    • 0032308292 scopus 로고    scopus 로고
    • Compression tolerant image authentication
    • Chicago, IL, Oct.
    • S. Bhattacharjee and M. Kutter, "Compression tolerant image authentication," in Proc. IEEE Int. Conf. Image Processing, Chicago, IL, Oct. 1998, vol. 1, pp. 435-439.
    • (1998) Proc. IEEE Int. Conf. Image Processing , vol.1 , pp. 435-439
    • Bhattacharjee, S.1    Kutter, M.2
  • 32
    • 0344271942 scopus 로고    scopus 로고
    • Dither-based secure image zhashing using distributed coding
    • Barcelona, Spain, Sep.
    • M. Johnson and K. Ramachandran, "Dither-based secure image zhashing using distributed coding," in Proc. IEEE Int. Conf. Image Processing, Barcelona, Spain, Sep. 2003, vol. 2, pp. 751-754.
    • (2003) Proc. IEEE Int. Conf. Image Processing , vol.2 , pp. 751-754
    • Johnson, M.1    Ramachandran, K.2
  • 34
    • 0031365813 scopus 로고    scopus 로고
    • Rotation, scale and translation invariant digital image watermarking
    • Santa Barbara, CA, Oct.
    • J. J. K. O'Ruanaidh and T. Pun, "Rotation, scale and translation invariant digital image watermarking," in Proc. IEEE Int. Conf. Image Processing, Santa Barbara, CA, Oct. 1997, vol. 1, pp. 536-539.
    • (1997) Proc. IEEE Int. Conf. Image Processing , vol.1 , pp. 536-539
    • O'Ruanaidh, J.J.K.1    Pun, T.2
  • 35
    • 0035335388 scopus 로고    scopus 로고
    • Rotation, scale, and translation resilient public watermarking for images
    • May
    • C.-Y. Lin, M. Wu, J. A. Bloom, M. L. Miller, I. J. Cox, and Y.-M. Lui, "Rotation, scale, and translation resilient public watermarking for images," IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001.
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.5 , pp. 767-782
    • Lin, C.-Y.1    Wu, M.2    Bloom, J.A.3    Miller, M.L.4    Cox, I.J.5    Lui, Y.-M.6
  • 38
    • 0016882596 scopus 로고
    • The rate-distortion function for source coding with side information at the decoder
    • Jan.
    • A. Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder," IEEE Trans. Inform. Theory, vol. IT-22, no. 1, pp. 1-10, Jan. 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , Issue.1 , pp. 1-10
    • Wyner, A.1    Ziv, J.2
  • 39
    • 84957877979 scopus 로고    scopus 로고
    • Attacks on copyright marking systems
    • Apr. Proc. Lecture Notes Comput. Sci. 1525. New York, Springer-Verlag, 3-540-65 386-4
    • F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on copyright marking systems," Second International Workshop on Information Hiding (IHW) Apr. 1998, Proc. Lecture Notes Comput. Sci. 1525. New York, Springer-Verlag, 3-540-65 386-4, pp. 219-239.
    • (1998) Second International Workshop on Information Hiding (IHW) , pp. 219-239
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 40
    • 0036755019 scopus 로고    scopus 로고
    • On the design of content-based multimedia authentication systems
    • Sep.
    • C. W. Wu, "On the design of content-based multimedia authentication systems," IEEE Trans. Multimedia, vol. 4, no. 3, pp. 385-393, Sep. 2002.
    • (2002) IEEE Trans. Multimedia , vol.4 , Issue.3 , pp. 385-393
    • Wu, C.W.1
  • 44
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell System Tech. J., vol. 28-4, pp. 656-715, 1949.
    • (1949) Bell System Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.