• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus 收录
  • 全国中文核心期刊
  • 中国科技论文统计源期刊
  • 中国科学引文数据库来源期刊

视频哈希的安全性分析

刘丽 王永庆

刘丽, 王永庆. 视频哈希的安全性分析[J]. 西南交通大学学报, 2012, 25(4): 675-679. doi: 10.3969/j.issn.0258-2724.2012.04.022
引用本文: 刘丽, 王永庆. 视频哈希的安全性分析[J]. 西南交通大学学报, 2012, 25(4): 675-679. doi: 10.3969/j.issn.0258-2724.2012.04.022
LIU Li, WANG Yongqing. Security Analysis of Video Hashing[J]. Journal of Southwest Jiaotong University, 2012, 25(4): 675-679. doi: 10.3969/j.issn.0258-2724.2012.04.022
Citation: LIU Li, WANG Yongqing. Security Analysis of Video Hashing[J]. Journal of Southwest Jiaotong University, 2012, 25(4): 675-679. doi: 10.3969/j.issn.0258-2724.2012.04.022

视频哈希的安全性分析

doi: 10.3969/j.issn.0258-2724.2012.04.022
基金项目: 

国家自然科学基金资助项目(51175443)

河南省科技厅基础与前沿技术研究计划项目(112300410215)

河南省高等学校青年骨干教师资助计划(2011GGJS-138)

河南省教育厅科学技术研究重点项目资助计划(12A520046)

河南省教育厅科技攻关项目(2010B510021)

Security Analysis of Video Hashing

  • 摘要: 为了对鲁棒多媒体哈希的安全性进行定量分析,用Shannon的唯一解距离来解释鲁棒多媒体哈希的安全性.以一个典型的鲁棒视频哈希算法为例,对该算法的特征提取方式进行数学建模,并针对不同的攻击类型,用Shannon的唯一解距离测量该鲁棒视频哈希算法的安全级别,定量分析其安全性.分析结果表明:鲁棒视频哈希算法一个密钥的重复使用次数不能超过所求得的唯一解距离,否则,算法的密钥可以被估计出来.

     

  • 郭伟,王小敏,刘景,等. 基于混沌消息扩展的单向Hash函数[J]. 西南交通大学学报,2010,45(5): 751-757. GUO Wei, WANG Xiaomin, LIU Jing, et al. One-way Hash function construction based on chaotic message expansion[J]. Journal of Southwest Jiaotong University, 2010, 45(5): 751-757.
    MAO S Y, WU M. Robust and secure image hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 215-230.
    MONGA V, BANERJEE A, EVANS B L. A clustering based approach to perceptual image hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(1): 68-79.
    COSKUN B, SANKUR B, MEMON N. Spatio-temporal transform based video hashing[J]. IEEE Transactions on Multimedia, 2006, 8(6): 1190-1208.
    JIN M, YOO C D. Quantum Hashing for multimedia[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(4): 982-994.
    JIAO Yuhua, JI Liping, NIU Xiamu. Robust speech hashing for content authentication[J]. IEEE Signal Processing Letters, 2009, 16(9): 818-821.
    项世军,杨建权. 基于约束随机分块的NMF图像哈希算法[J]. 电子与信息学报,2011,33(2): 337-341. XIANG Shijun, YANG Jianquan. NMF-based image hashing algorithm using restricted random blocking[J]. Journal of Electronics & Information Technology, 2011, 33(2): 337-341.
    LEI Yanqiang, WANG Yuangen, HUANG Jiwu. Robust image hash in radon transform domain for authentication[J]. Signal Processing: Image Communication, 2011, 26(6): 280-288.
    LI Weng, BART P. A novel video Hash algorithm//18th ACM International Conference on Multimedia ACM Multimedia 2010-MM'10. New York: Association for Computing Machinery, 2010: 739-742.
    NIE Xiushan, LIU Ju, SUN Jiande, et al. Robust video Hashing based on double-layer embedding[J]. IEEE Signal Processing Letters, 2011, 18(5): 307-310.
    NIE Xiushan, LIU Ju, SUN Jiande, et al. Key-frame based robust video Hashing using isometric feature mapping[J]. Journal of Computational Information Systems, 2011, 7(6): 2112-2119.
    SWAMINATHAN A , MAO Yinian, WU Min. Robust and secure image Hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 215-230.
    ZHU Guopu, HUANG Jiwu, KWONG S, et al. A study on the randomness measure of image Hashing[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(4): 928-932.
    MAO Yinian, WU Min. Unicity distance of robust image Hashing[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 462-467.
    刘丽,彭代渊. 一种新的适用于广播监视的安全视频水印算法[J]. 计算机学报,2009,32(11): 2239-2246. LIU Li, PENG Daiyuan. A novel secure video watermarking for broadcast monitoring[J]. Chinese Journal of Computers, 2009, 32(11): 2239-2246.
  • 加载中
计量
  • 文章访问数:  874
  • HTML全文浏览量:  56
  • PDF下载量:  568
  • 被引次数: 0
出版历程
  • 收稿日期:  2011-09-03
  • 刊出日期:  2012-08-25

目录

    /

    返回文章
    返回