Abstract

Perceptual video hashing represents video perceptual content by compact hash. The binary hash is sensitive to content distortion manipulations, but robust to perceptual content preserving operations. Currently, boundary between sensitivity and robustness is often ambiguous and it is decided by an empirically defined threshold. This may result in large false positive rates when received video is to be judged similar or dissimilar in some circumstances, e.g., video content authentication. In this paper, we propose a novel perceptual hashing method for video content authentication based on maximized robustness. The developed idea of maximized robustness means that robustness is maximized on condition that security requirement of hash is first met. We formulate the video hashing as a constrained optimization problem, in which coefficients of features offset and robustness are to be learned. Then we adopt a stochastic optimization method to solve the optimization. Experimental results show that the proposed hashing is quite suitable for video content authentication in terms of security and robustness.

Highlights

  • Thanks to the openness of Internet and the easiness of advanced multimedia tools, multimedia contents may undergo certain operations when they are shared within the network

  • We show an example of video perceptual content changing manipulations in Fig. 4, where (a) is the original frame, (b) is the result of block overlaying by one Mosaic of 200 × 200, (c) is the result of pasting by an image with 20% content being pasted and (d) is the result of block shuffling with 16 equal blocks

  • 5 Conclusion In this paper we have proposed a video perceptual hashing method to authentication video content based on maximized robustness idea

Read more

Summary

Introduction

Thanks to the openness of Internet and the easiness of advanced multimedia tools, multimedia contents (e.g., image, video) may undergo certain operations when they are shared within the network. The non-malicious operations preserve the perceptual content and keep intact the understanding of the content, while the malicious operations deliberately distort the integrity The former is usually allowable and the latter is unacceptable. Traditional integrity authentication methods (e.g., Message Digest, Secure Hashing Algorithm) fail to check perceptual content, if both the allowable and unacceptable operations are taken into consideration. Hashes generated by those methods are bit-wise sensitive and leave no room for the perceptual content preserving actions. Perceptual hashing for image or video is an effective way to afford authentication of perceptual content, allowing the malicious-free operations happening [1]. It denotes the video by a compact string and discerns the secure content from the attacked content

Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call