视频哈希的安全性分析
doi: 10.3969/j.issn.0258-2724.2012.04.022
Security Analysis of Video Hashing
-
摘要: 为了对鲁棒多媒体哈希的安全性进行定量分析,用Shannon的唯一解距离来解释鲁棒多媒体哈希的安全性.以一个典型的鲁棒视频哈希算法为例,对该算法的特征提取方式进行数学建模,并针对不同的攻击类型,用Shannon的唯一解距离测量该鲁棒视频哈希算法的安全级别,定量分析其安全性.分析结果表明:鲁棒视频哈希算法一个密钥的重复使用次数不能超过所求得的唯一解距离,否则,算法的密钥可以被估计出来.Abstract: In order to analyze the security of robust multimedia hashing quantitatively, Shannon's unicity distance was adopted to explain the security of robust multimedia hashing. A typical robust video hashing algorithm was used as an example, and a mathematics model for randomized feature extraction of the algorithm was found. Attacks for the typical video hashing algorithm were classified, and unicity distance, a concept proposed by Shannon, was adopted to measure the security level of the typical video hashing algorithm and analyze its security quantitatively. Theoretical analysis results show that the repeated use number of times of a robust video hashing algorithm's key cannot exceed the unicity distance, otherwise the key can be estimated.
-
Key words:
- digital watermark /
- video hashing /
- security /
- unicity distance
-
郭伟,王小敏,刘景,等. 基于混沌消息扩展的单向Hash函数[J]. 西南交通大学学报,2010,45(5): 751-757. GUO Wei, WANG Xiaomin, LIU Jing, et al. One-way Hash function construction based on chaotic message expansion[J]. Journal of Southwest Jiaotong University, 2010, 45(5): 751-757. MAO S Y, WU M. Robust and secure image hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 215-230. MONGA V, BANERJEE A, EVANS B L. A clustering based approach to perceptual image hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(1): 68-79. COSKUN B, SANKUR B, MEMON N. Spatio-temporal transform based video hashing[J]. IEEE Transactions on Multimedia, 2006, 8(6): 1190-1208. JIN M, YOO C D. Quantum Hashing for multimedia[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(4): 982-994. JIAO Yuhua, JI Liping, NIU Xiamu. Robust speech hashing for content authentication[J]. IEEE Signal Processing Letters, 2009, 16(9): 818-821. 项世军,杨建权. 基于约束随机分块的NMF图像哈希算法[J]. 电子与信息学报,2011,33(2): 337-341. XIANG Shijun, YANG Jianquan. NMF-based image hashing algorithm using restricted random blocking[J]. Journal of Electronics & Information Technology, 2011, 33(2): 337-341. LEI Yanqiang, WANG Yuangen, HUANG Jiwu. Robust image hash in radon transform domain for authentication[J]. Signal Processing: Image Communication, 2011, 26(6): 280-288. LI Weng, BART P. A novel video Hash algorithm//18th ACM International Conference on Multimedia ACM Multimedia 2010-MM'10. New York: Association for Computing Machinery, 2010: 739-742. NIE Xiushan, LIU Ju, SUN Jiande, et al. Robust video Hashing based on double-layer embedding[J]. IEEE Signal Processing Letters, 2011, 18(5): 307-310. NIE Xiushan, LIU Ju, SUN Jiande, et al. Key-frame based robust video Hashing using isometric feature mapping[J]. Journal of Computational Information Systems, 2011, 7(6): 2112-2119. SWAMINATHAN A , MAO Yinian, WU Min. Robust and secure image Hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 215-230. ZHU Guopu, HUANG Jiwu, KWONG S, et al. A study on the randomness measure of image Hashing[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(4): 928-932. MAO Yinian, WU Min. Unicity distance of robust image Hashing[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 462-467. 刘丽,彭代渊. 一种新的适用于广播监视的安全视频水印算法[J]. 计算机学报,2009,32(11): 2239-2246. LIU Li, PENG Daiyuan. A novel secure video watermarking for broadcast monitoring[J]. Chinese Journal of Computers, 2009, 32(11): 2239-2246.
点击查看大图
计量
- 文章访问数: 874
- HTML全文浏览量: 56
- PDF下载量: 568
- 被引次数: 0