Paper
8 June 2012 A novel evaluation method for perceptual hash algorithm in authentication mode
Zhaoqing Liu, Qiong Li, Jingrui Liu, Xiamu Niu
Author Affiliations +
Proceedings Volume 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012); 833444 (2012) https://doi.org/10.1117/12.968564
Event: Fourth International Conference on Digital Image Processing (ICDIP 2012), 2012, Kuala Lumpur, Malaysia
Abstract
Perceptual hash is an important research branch of multimedia security, while the evaluation of performance of a perceptual hash algorithm is not well studied so far. The traditional performance of a perceptual hash algorithm is robustness and discriminability. Such evaluation criterion is not good enough to judge an algorithm, especially for a perceptual hash algorithm working in authentication mode. In this paper, anew evaluation method is proposed to evaluate an authentication oriented perceptual hash algorithm by the capability of distinguish the malicious tamper from content preserving operations. A new performance, Identical Perceptual Distance, is also defined to quantize the ability. The thorough test on several representative published perceptual hash algorithms shows the feasibility of the proposed evaluation method.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhaoqing Liu, Qiong Li, Jingrui Liu, and Xiamu Niu "A novel evaluation method for perceptual hash algorithm in authentication mode", Proc. SPIE 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012), 833444 (8 June 2012); https://doi.org/10.1117/12.968564
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Genetic algorithms

Detection and tracking algorithms

Multimedia

Databases

Image fusion

Algorithm development

Analytical research

Back to Top