Abstract
Perceptual hash functions are important for video authentication based on digital signature verifying the originality and integrity of videos. They derive hashes from the perceptual contents of the videos and are robust against the common content-preserving operations on the videos. The advancements in the field of scalable video coding call for efficient hash functions that are also robust against the temporal, spatial and bit rate scalability features of the these coding schemes. This paper presents a new algorithm to extract hashes of scalably coded videos using the 3D discrete wavelet transform. A hash of a video is computed at the group-of-frames level from the spatio-temporal low-pass bands of the wavelet-transformed groups-of-frames. For each group-of-frames, the spatio-temporal low-pass band is divided into perceptual blocks and a hash is derived from the cumulative averages of their averages. Experimental results demonstrate the robustness of the hash function against the scalability features and the common content-preserving operations as well as the sensitivity to the various types of content differences. Two critical properties of the hash function, diffusion and confusion, are also examined.
Similar content being viewed by others
References
Kalker, T., Haitsma, J., Oostveen, J.: Issues with digital watermarking and perceptual hashing. In: Proceedings of the SPIE Multimedia Systems Appl. IV, Denver, CO. 4518, 189–197 (Aug 2001)
Han, S.-H., Chu, C.-H.: Content-based image authentication: current status, issues and challenges. Springer Int. J. Inf. Secur. 9(1), 19–32 (2010)
Adami, N., Signoroni, A., Leonardi, R.: State-of-the-art and trends in scalable video compression with wavelet-based approaches. IEEE Trans. Circuits Syst. Video Tech. 17(9), 1238–1255 (2007)
Atrey, P.K., Yan, W.Q., Kankanhalli, M.S.: A scalable signature scheme for video authentication. Springer J. Multimed. Tools Appl. 34(1), 107–135 (2007)
Roover, C.D., Vleeschouwer, C.D., Lefebvre, F., Macq, B.: Robust video hashing based on radial projections of key frames. IEEE Trans. Signal Process. 53, 4020–4037 (2005)
Oostveen, J., Kalker, T., Haitsma, J.: Visual hashing of digital video: applications and techniques. In: Proceedings of the SPIE Application of Digital Image Processing XXIV, San Diego, CA 4472, 121–131 (July/Aug 2001)
Uehara, T., Safavi-Naini, R., Ogunbona, P.: An MPEG tolerant authentication system for video data. In: Proceedings of the IEEE International Conference Multimedia Expo, Taipei, pp. 891–894 (June 2004)
Sun, Q., He, D., Tian, Q.: A secure and robust authentication scheme for video transcoding. IEEE Trans. Circuits Syst. Video Tech. 16(10), 1232–1244 (2006)
Coskun, B., Sankur, B., Memon, N.: Spatio-temporal transform based video hashing. IEEE Trans. Multimed. 8(6), 1190–1208 (2006)
Sun, Q., Chang, S.-F.: A secure and robust digital signature scheme for JPEG2000 image authentication system. IEEE Trans. Multimed. 7(3), 480–494 (2005)
Vetro, A., Christopoulos, C., Sun, H.: Video transcoding architectures and techniques: an overview. IEEE Signal Process. Mag. 20(2), 18–29 (2003)
Kim, B.-J., Xiong, Z., Pearlman, W.A.: Low bit-rate scalable video coding with 3-D set partitioning in hierarchical trees (3-D SPIHT). IEEE Trans. Circuits Syst. Video Tech. 10(8), 1374–1387 (2000)
Danyali, H., Mertins, A.: A fully SNR, spatial and temporal scalable 3DSPIHT-based video coding algorithm for video streaming over heterogeneous networks. In: Proceedings of the IEEE International Conference Convergent Technologies Asia-Pacific Region, Bangalore 4, 1445–1449 (Oct 2003)
Bottreau, V., Benetiere, M., Felts, B., Pesquet-Popescu, B.: A fully scalable 3D subband video codec. In: Proceedings of the IEEE International Conference Image Processing, Thessaloniki, 2, 1017–1020 (July 2001)
Strang, G., Nguyen, T.Q.: Wavelets and Filter Banks. Wellesley-Cambridge Press, MA (1996)
Coskun, B., Memon, N.: Confusion/ diffusion capabilities of some robust hash functions. In: Proceedings of the IEEE 40th Annual Conference Information Sciences Systems. Princeton, NJ, pp. 1188–1193 (March 2006)
Proakis, J.G., Manolakis, D.G.: Digital Signal Processing: Principles, Algorithms, and Applications. Prentice-Hall, NJ (1996)
Tao, Y., Muthukkumarasamy, V., Verma, B., Blumenstein, M.: A texture feature extraction technique using 2D-DFT and hamming distance. In: Proceedings of the IEEE International Conference on Computational Intelligence Multimedia Applications, Xi’an, pp. 120–125 (Sept 2003)
Dutta, Mazumdar D., Chanda, B.: Digital Image Processing and Analysis. Prentice-Hall of India, New Delhi (2000)
Jain, A.K.: Fundamentals of Digital Image Processing. Englewood Cliffs, NJ (1989)
Antonini, M., Barlaud, M., Mathieu, P., Daubechies, I.: Image coding using wavelet transform. IEEE Trans. Image Process. 1, 205–220 (1992)
Thiemert, S., Sahbi, H., Steinebach, M.: Using entropy for image and video authentication watermarks. In: Proceeding of the SPIE Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA 6072, pp. 607218 (Feb 2006)
Acknowledgments
The authors acknowledge the unanimous reviewers for their valuable suggestions which are included in the paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Saikia, N., Bora, P.K. Perceptual hash function for scalable video. Int. J. Inf. Secur. 13, 81–93 (2014). https://doi.org/10.1007/s10207-013-0211-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-013-0211-z