{"title":"具有健壮散列的可伸缩多媒体内容完整性验证","authors":"S. Ababneh, R. Ansari, A. Khokhar","doi":"10.1109/EIT.2008.4554310","DOIUrl":null,"url":null,"abstract":"We propose a scalable, robust and recovery-driven multimedia content authentication system which exploits content-based robust hashing and watermark embedding to provide effective integrity verification of multimedia content. In addition, we propose providing content recovery by exploiting the collaborative decentralized nature of P2P networks. In this paper, we focus on the issues pertaining to the competing requirements of authentication robustness and tamper-detection accuracy. To this end, we describe a hierarchal hashing scheme that combines both fragile and robust features to generate a versatile watermark. We implement a representative image hashing that is robust to JPEG2000 compression and embedding distortion while being sensitive to tampering. Experimental results are presented to show the schemepsilas effectiveness.","PeriodicalId":215400,"journal":{"name":"2008 IEEE International Conference on Electro/Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Scalable multimedia-content integrity verification with robust hashing\",\"authors\":\"S. Ababneh, R. Ansari, A. Khokhar\",\"doi\":\"10.1109/EIT.2008.4554310\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a scalable, robust and recovery-driven multimedia content authentication system which exploits content-based robust hashing and watermark embedding to provide effective integrity verification of multimedia content. In addition, we propose providing content recovery by exploiting the collaborative decentralized nature of P2P networks. In this paper, we focus on the issues pertaining to the competing requirements of authentication robustness and tamper-detection accuracy. To this end, we describe a hierarchal hashing scheme that combines both fragile and robust features to generate a versatile watermark. We implement a representative image hashing that is robust to JPEG2000 compression and embedding distortion while being sensitive to tampering. Experimental results are presented to show the schemepsilas effectiveness.\",\"PeriodicalId\":215400,\"journal\":{\"name\":\"2008 IEEE International Conference on Electro/Information Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE International Conference on Electro/Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EIT.2008.4554310\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Conference on Electro/Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT.2008.4554310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Scalable multimedia-content integrity verification with robust hashing
We propose a scalable, robust and recovery-driven multimedia content authentication system which exploits content-based robust hashing and watermark embedding to provide effective integrity verification of multimedia content. In addition, we propose providing content recovery by exploiting the collaborative decentralized nature of P2P networks. In this paper, we focus on the issues pertaining to the competing requirements of authentication robustness and tamper-detection accuracy. To this end, we describe a hierarchal hashing scheme that combines both fragile and robust features to generate a versatile watermark. We implement a representative image hashing that is robust to JPEG2000 compression and embedding distortion while being sensitive to tampering. Experimental results are presented to show the schemepsilas effectiveness.