Paper
18 March 2008 Security analysis of robust perceptual hashing
Oleksiy Koval, Sviatoslav Voloshynovskiy, Fokko Beekhof, Thierry Pun
Author Affiliations +
Abstract
In this paper we considered the problem of security analysis of robust perceptual hashing in authentication application. The main goal of our analysis was to estimate the amount of trial efforts of the attacker, who is acting within the Kerckhoffs security principle, to reveal a secret key. For this purpose, we proposed to use Shannon equivocation that provides an estimate of complexity of the key search performed based on all available prior information and presented its application to security evaluation of particular robust perceptual hashing algorithms.
© (2008) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Oleksiy Koval, Sviatoslav Voloshynovskiy, Fokko Beekhof, and Thierry Pun "Security analysis of robust perceptual hashing", Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 681906 (18 March 2008); https://doi.org/10.1117/12.764846
Lens.org Logo
CITATIONS
Cited by 24 scholarly publications and 1 patent.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Binary data

Distortion

Computer security

Multimedia

Statistical analysis

Computer programming

Back to Top