18 March 2008 Security analysis of robust perceptual hashing
Author Affiliations +
In this paper we considered the problem of security analysis of robust perceptual hashing in authentication application. The main goal of our analysis was to estimate the amount of trial efforts of the attacker, who is acting within the Kerckhoffs security principle, to reveal a secret key. For this purpose, we proposed to use Shannon equivocation that provides an estimate of complexity of the key search performed based on all available prior information and presented its application to security evaluation of particular robust perceptual hashing algorithms.
© (2008) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Oleksiy Koval, Oleksiy Koval, Sviatoslav Voloshynovskiy, Sviatoslav Voloshynovskiy, Fokko Beekhof, Fokko Beekhof, Thierry Pun, Thierry Pun, } "Security analysis of robust perceptual hashing", Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 681906 (18 March 2008); doi: 10.1117/12.764846; https://doi.org/10.1117/12.764846

Back to Top