Paper
9 May 2000 Visual hash for oblivious watermarking
Author Affiliations +
Abstract
Digital watermarks have recently been proposed for authentication and fingerprinting of both video data and still images and for integrity verification of visual multimedia. In such applications, the watermark must be oblivious and has to depend on a secret key and on the original image. It is important that the dependence on the key be sensitive, while the dependence on the image be continuous (robust). Both requirements can be satisfied using special image digest (hash) functions that return the same bit-string for whole class of images derived from an original image using common processing operations including rotation and scaling. It is further required that two completely different images produce completely different bit-strings. In this paper, we extend our previous work on robust image digest functions describing ideas how to make the hash function independent of image orientation and size. The robust image digest can be clearly utilized for other applications, such as a search index for an efficient image database search.
© (2000) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jessica Fridrich "Visual hash for oblivious watermarking", Proc. SPIE 3971, Security and Watermarking of Multimedia Contents II, (9 May 2000); https://doi.org/10.1117/12.384982
Lens.org Logo
CITATIONS
Cited by 81 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Visualization

Image processing

Video

Databases

Image compression

Image filtering

RELATED CONTENT

Small object detection via fast discrete Curvelet transform
Proceedings of SPIE (September 30 2013)
Watermark extimation through local pixel correlation
Proceedings of SPIE (April 09 1999)
Resource-driven content adaptation
Proceedings of SPIE (February 02 2006)
FFT-based technique for image-signature generation
Proceedings of SPIE (January 15 1997)

Back to Top