Toshiyuki Dobashi, Osamu Watanabe, T. Fukuhara, H. Kiya
{"title":"加密域JPEG 2000图像的哈希识别","authors":"Toshiyuki Dobashi, Osamu Watanabe, T. Fukuhara, H. Kiya","doi":"10.1109/ISPACS.2012.6473535","DOIUrl":null,"url":null,"abstract":"A hash-based identification method for JPEG 2000 images is proposed in this paper. A new algorithm is introduced to calculate the hash value from the number of zero-bit-planes that can be extracted from the JPEG 2000 codestream by only parsing the header information. Furthermore, the proposed method uses hash value, and therefore, the length of the data used for identification is fixed. The processing speed of the proposed method should be fast since a fixed length data is used for the identification. The method avoids estimating an image from the feature because it uses hash value. Moreover, the image data can be encrypted because it uses pre-calculated hash value for identification. The experimental results showed the effectiveness of the proposed method.","PeriodicalId":158744,"journal":{"name":"2012 International Symposium on Intelligent Signal Processing and Communications Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Hash-based identification of JPEG 2000 images in encrypted domain\",\"authors\":\"Toshiyuki Dobashi, Osamu Watanabe, T. Fukuhara, H. Kiya\",\"doi\":\"10.1109/ISPACS.2012.6473535\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A hash-based identification method for JPEG 2000 images is proposed in this paper. A new algorithm is introduced to calculate the hash value from the number of zero-bit-planes that can be extracted from the JPEG 2000 codestream by only parsing the header information. Furthermore, the proposed method uses hash value, and therefore, the length of the data used for identification is fixed. The processing speed of the proposed method should be fast since a fixed length data is used for the identification. The method avoids estimating an image from the feature because it uses hash value. Moreover, the image data can be encrypted because it uses pre-calculated hash value for identification. The experimental results showed the effectiveness of the proposed method.\",\"PeriodicalId\":158744,\"journal\":{\"name\":\"2012 International Symposium on Intelligent Signal Processing and Communications Systems\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Symposium on Intelligent Signal Processing and Communications Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPACS.2012.6473535\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Symposium on Intelligent Signal Processing and Communications Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPACS.2012.6473535","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hash-based identification of JPEG 2000 images in encrypted domain
A hash-based identification method for JPEG 2000 images is proposed in this paper. A new algorithm is introduced to calculate the hash value from the number of zero-bit-planes that can be extracted from the JPEG 2000 codestream by only parsing the header information. Furthermore, the proposed method uses hash value, and therefore, the length of the data used for identification is fixed. The processing speed of the proposed method should be fast since a fixed length data is used for the identification. The method avoids estimating an image from the feature because it uses hash value. Moreover, the image data can be encrypted because it uses pre-calculated hash value for identification. The experimental results showed the effectiveness of the proposed method.