Paper
9 May 2000 Visual hash for oblivious watermarking
Author Affiliations +
Abstract
Digital watermarks have recently been proposed for authentication and fingerprinting of both video data and still images and for integrity verification of visual multimedia. In such applications, the watermark must be oblivious and has to depend on a secret key and on the original image. It is important that the dependence on the key be sensitive, while the dependence on the image be continuous (robust). Both requirements can be satisfied using special image digest (hash) functions that return the same bit-string for whole class of images derived from an original image using common processing operations including rotation and scaling. It is further required that two completely different images produce completely different bit-strings. In this paper, we extend our previous work on robust image digest functions describing ideas how to make the hash function independent of image orientation and size. The robust image digest can be clearly utilized for other applications, such as a search index for an efficient image database search.
© (2000) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jessica Fridrich "Visual hash for oblivious watermarking", Proc. SPIE 3971, Security and Watermarking of Multimedia Contents II, (9 May 2000); https://doi.org/10.1117/12.384982
Lens.org Logo
CITATIONS
Cited by 81 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Visualization

Image processing

Video

Databases

Image compression

Image filtering

RELATED CONTENT

Multimedia systems for art and culture a case study...
Proceedings of SPIE (January 15 1997)
Feature point extraction in compressed domain
Proceedings of SPIE (January 10 2003)
Feature management for large video databases
Proceedings of SPIE (April 14 1993)
Return of ambiguity attacks
Proceedings of SPIE (April 29 2002)

Back to Top