University of Wollongong
Browse

Compression tolerant DCT based image hash

Download (604.33 kB)
conference contribution
posted on 2024-11-18, 16:52 authored by C Kailasanathan, Reihaneh Safavi-Naini, Philip OgunbonaPhilip Ogunbona
With the advent of Internet image authentication has become a central part of research in security. Since JPEG has recommended discrete cosine transform as one of the steps in image compression systems, a hash function which utilizes discrete cosine decomposition is desirable. In this paper, we propose a discrete cosine based hash function which distinguishes acceptable level of compression from image processing modifications such as Median filtering, Gaussian noise addition, and FMLR attack. To increase manipulation detection, we optimize the number of AC coefficients needed in smoothing.

History

Citation

This article was originally published as: Kailasanathan, C, Safavi-Naini, R & Ogunbona, P, Compression tolerant DCT based image hash, Proceedings 23rd International Conference on Distributed Computing Systems Workshops, 19-22 May 2003, 562-567. Copyright IEEE 2003.

Language

English

Usage metrics

    Categories

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC