Azhar Hadmi, W. Puech, B. A. E. Said, A. A. Ouahman
{"title":"Analysis of the robustness of wavelet-based perceptual signatures","authors":"Azhar Hadmi, W. Puech, B. A. E. Said, A. A. Ouahman","doi":"10.1109/IPTA.2010.5586764","DOIUrl":null,"url":null,"abstract":"Perceptual image hashing maps an image to a fixed length binary string based on the image's appearance to the human eye, and has applications in image indexing, authentication, and watermarking. In this paper, we analyze the robustness of perceptual signatures generated by the known SHA1 hash function in the DWT domain. This is achieved by generation signatures from the coefficients of the subband LL after a DWT transformation. Experiments on large-scale database show that the proposed method is efficient, robust against common content-preserving manipulations.","PeriodicalId":236574,"journal":{"name":"2010 2nd International Conference on Image Processing Theory, Tools and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd International Conference on Image Processing Theory, Tools and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IPTA.2010.5586764","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Perceptual image hashing maps an image to a fixed length binary string based on the image's appearance to the human eye, and has applications in image indexing, authentication, and watermarking. In this paper, we analyze the robustness of perceptual signatures generated by the known SHA1 hash function in the DWT domain. This is achieved by generation signatures from the coefficients of the subband LL after a DWT transformation. Experiments on large-scale database show that the proposed method is efficient, robust against common content-preserving manipulations.