Introduction
A robust hash is essentially a low-dimensional representation of a multimedia signal which is linked to its perceptual content. This representation acts as a descriptor which allows for flexible identification of this type of signal. Flexibility is needed because any multimedia signal —that is, image, audio, or video— may appear in slightly different but perceptually equivalent forms owing to lossy compression, transcoding, clipping/cropping, or a number of other reasons. Therefore, identifiers strictly associated to a particular bit representation of a multimedia signal —such as a cryptographic hash [1]— are far too strict. If robust hashing is to become something like “cryptographic hashing for multimedia” then it is reasonable to expect from it key properties of cryptographic hashing while simultaneously trying to overcome its intrinsic limitation with respect to multimedia signals. Exploiting source coding with distortion constraints is the natural way to achieve this end. The connection between these two areas is explored further on in this chapter in an attempt to produce an accurate definition of robust hashing and its requirements conforming to the point of view expressed above. This point of view is perhaps not the most common in the literature of the subject, which has mainly dealt with the production of robust low-dimensional descriptors but not so much with their connection with cryptographic hashing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Oppliger, R.: Contemporary Cryptography. Artech House (2005)
Kilian, J., Leighton, F., Matheson, L., Shamoon, T., Tarjan, R., Zane, F.: Resistance of digital watermarks to collusive attacks. In: Proceedings of the IEEE International Symposium on Information Theory, p. 271 (1998)
Subramanya, S., Simha, R., Narahari, B., Youssef, A.: Transform-based indexing of audio data for multimedia databases. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems 1997. pp. 211–218 (1997)
Cohen, S., Guibas, L.: Shape-based image retrieval using geometric hashing. In: Procs. of the ARPA Image Understanding Workshop (1997)
Fridrich, J.: Robust bit extraction from images. In: Proc. IEEE ICMCS, Florence, Italy, pp. 536–540 (1999)
Venkatesan, R., Koon, S., Jakubowski, M., Moulin, P.: Robust image hashing. In: Procs. of the IEEE International Conference on Image Processing, Vancouver, Canada (2000)
Mihçak, M.K., Venkatesan, R.: A perceptual audio hashing algorithm: A tool for robust audio identification and information hiding. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 51–65. Springer, Heidelberg (2001)
Haitsma, J., Kalker, T., Oostveen, J.: Robust audio hashing for content identification. In: Procs. of the International Workshop on Content-Based Multimedia Indexing, Brescia, Italy, pp. 117–125 (2001)
Martinian, E., Wornell, G., Chen, B.: Authentication with distortion criteria. IEEE Transactions on Information Theory 51(7), 2523–2542 (2005)
Cano, P., Batlle, E., Kalker, T., Haitsma, J.: A review of audio fingerprinting. J. VLSI Signal Process. Syst. 41(3), 271–284 (2005)
Wang, A.: The Shazam music recognition service. Communications of the ACM 49(8), 44–48 (2006)
McCarthy, E.P., Balado, F., Silvestre, G.C.M., Hurley, N.J.: A framework for soft hashing and its application to robust image hashing. In: Procs. of the IEEE International Conference on Image Processing, Singapore (2004)
Voloshynovskiy, S., Koval, O., Beekhof, F., Pun, T.: Conception and limits of robust perceptual hashing: towards side information assisted hash functions. In: Media Forensics and Security, vol. 7254. SPIE, San Jose (2009)
Rivest, R.: The MD5 message-digest algorithm. Technical report, IETF Network Working Group (1992)
Federal Information Processing Standard: Secure hash standard. Technical report, National Institute of Standards and Technology, US Department of Commerce, Washington, USA (1995)
Contini, S., Steinfeld, R., Pieprzyk, J., Matusiewicz, K.: A critical look at cryptographic hash function literature. In: ECRYPT Hash Workshop (2007)
Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)
Pradhan, S., Chou, J., Ramchandran, K.: Duality between source coding and channel coding and its extension to the side information case. IEEE Transactions on Information Theory 49(5), 1181–1203 (2003)
Johnson, M., Ramchandran, K.: Dither-based secure image hashing using distributed coding. In: Procs. of the IEEE International Conf. on Image Processing, Barcelona, Spain, vol. 2, pp. 751–754 (2003)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security: theory and practice. IEEE Transactions on Signal Processing 53(10), 3976–3987 (2005)
Koval, O., Voloshynovskiy, S., Beekhof, F., Pun, T.: Security analysis of robust perceptual hashing. SPIE Conference Series, vol. 6819 (2008)
Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Blind Newton sensitivity attack. IEE Proceedings of Information Security 153(3), 115–125 (2006)
Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Transactions on Information Forensics and Security 1(2), 215–230 (2006)
Lefebvre, F., Macq, B., Legat, J.D.: Rash: Radon soft hash algorithm. In: Eurasip (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Balado, F. (2010). An Introduction to the Principles and Requirements of Robust Hashing. In: Sencar, H.T., Velastin, S., Nikolaidis, N., Lian, S. (eds) Intelligent Multimedia Analysis for Security Applications. Studies in Computational Intelligence, vol 282. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11756-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-11756-5_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11754-1
Online ISBN: 978-3-642-11756-5
eBook Packages: EngineeringEngineering (R0)