Paper
4 February 2009 On security threats for robust perceptual hashing
O. Koval, S. Voloshynovskiy, P. Bas, F. Cayre
Author Affiliations +
Proceedings Volume 7254, Media Forensics and Security; 72540H (2009) https://doi.org/10.1117/12.807487
Event: IS&T/SPIE Electronic Imaging, 2009, San Jose, California, United States
Abstract
Perceptual hashing has to deal with the constraints of robustness, accuracy and security. After modeling the process of hash extraction and the properties involved in this process, two different security threats are studied, namely the disclosure of the secret feature space and the tampering of the hash. Two different approaches for performing robust hashing are presented: Random-Based Hash (RBH) where the security is achieved using a random projection matrix and Content-Based Hash (CBH) were the security relies on the difficulty to tamper the hash. As for digital watermarking, different security setups are also devised: the Batch Hash Attack, the Group Hash Attack, the Unique Hash Attack and the Sensitivity Attack. A theoretical analysis of the information leakage in the context of Random-Based Hash is proposed. Finally, practical attacks are presented: (1) Minor Component Analysis is used to estimate the secret projection of Random-Based Hashes and (2) Salient point tampering is used to tamper the hash of Content-Based Hashes systems.
© (2009) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
O. Koval, S. Voloshynovskiy, P. Bas, and F. Cayre "On security threats for robust perceptual hashing", Proc. SPIE 7254, Media Forensics and Security, 72540H (4 February 2009); https://doi.org/10.1117/12.807487
Lens.org Logo
CITATIONS
Cited by 12 scholarly publications and 2 patents.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Digital watermarking

Databases

Quantization

Sensors

Transform theory

Binary data

Back to Top