Abstract
Parameterized wavelet filters and wavelet packet subband structures are discussed to be used as key dependent wavelet transforms in order to enhance the security of wavelet based hashing schemes. Experiments show that key dependency and keyspace of the hashing scheme considered have been significantly improved. The attack resistance could only be slightly enhanced by using parametrized wavelet filters.
This work has been partially supported by the Austrian Science Fund FWF, project no. P15170.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Dietl, W.M., Uhl, A.: Robustness against unauthorized watermark removal attacks via key-dependent wavelet packet subband structures. In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME 2004, Taipei, Taiwan (June 2004)
Dietl, W., Meerwald, P., Uhl, A.: Protection of wavelet-based watermarking systems using filter parametrization. Signal Processing (Special Issue on Security of Data Hiding Technologies) 83, 2095–2116 (2003)
Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the IEEE International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA (March 2000)
Köckerbauer, T., Kumar, M., Uhl, A.: Lightweight JPEG 2000 confidentiality for mobile environments. In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME 2004, Taipei, Taiwan (June 2004)
Meixner, A., Uhl, A.: Analysis of a wavelet-based robust hash algorithm. In: Delp, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VI, Proceedings of SPIE, San Jose, CA, USA, January 2004, vol. 5306, pp. 772–783. SPIE (2004)
Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data — efficiency and security. ACM Multimedia Systems (Special issue on Multimedia Security) 9(3), 279–287 (2003)
Radhakrishnan, R., Xiong, Z., Memom, N.D.: Security of visual hash functions. In: Wong, P.W., Delp, E.J. (eds.) Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, January 2003. SPIE, vol. 5020 (2003)
Schneid, J., Pittner, S.: On the parametrization of the coefficients of dilation equations for compactly supported wavelets. Computing 51, 165–173 (1993)
Venkatesan, R., Koon, S.-M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2000), Vancouver, Canada (September 2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Meixner, A., Uhl, A. (2005). Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations. In: Roli, F., Vitulano, S. (eds) Image Analysis and Processing – ICIAP 2005. ICIAP 2005. Lecture Notes in Computer Science, vol 3617. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553595_67
Download citation
DOI: https://doi.org/10.1007/11553595_67
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28869-5
Online ISBN: 978-3-540-31866-8
eBook Packages: Computer ScienceComputer Science (R0)