Spatio–Temporal Transform Based Video Hashing
Top Cited Papers
- 20 November 2006
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Multimedia
- Vol. 8 (6) , 1190-1208
- https://doi.org/10.1109/tmm.2006.884614
Abstract
Identification and verification of a video clip via its fingerprint find applications in video browsing, database search and security. For this purpose, the video sequence must be collapsed into a short fingerprint using a robust hash function based on signal processing operations. We propose two robust hash algorithms for video based both on the discrete cosine transform (DCT), one on the classical basis set and the other on a novel randomized basis set (RBT). The robustness and randomness properties of the proposed hash functions are investigated in detail. It is found that these hash functions are resistant to signal processing and transmission impairments, and therefore can be instrumental in building database search, broadcast monitoring and watermarking applications for video. The DCT hash is more robust, but lacks security aspect, as it is easy to find different video clips with the same hash value. The RBT based hash, being secret key based, does not allow this and is more secure at the cost of a slight loss in the receiver operating curvesKeywords
This publication has 15 references indexed in Scilit:
- Fast and robust short video clip search using an index structurePublished by Association for Computing Machinery (ACM) ,2004
- Image Quality Assessment: From Error Visibility to Structural SimilarityIEEE Transactions on Image Processing, 2004
- A robust image fingerprinting system using the Radon transformSignal Processing: Image Communication, 2004
- Real time repeated video sequence identificationComputer Vision and Image Understanding, 2004
- Video quality assessment based on structural distortion measurementSignal Processing: Image Communication, 2003
- On the security of the digest function in the SARI image authentication systemIEEE Transactions on Circuits and Systems for Video Technology, 2002
- Compression tolerant image authenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A robust image authentication method distinguishing JPEG compression from malicious manipulationIEEE Transactions on Circuits and Systems for Video Technology, 2001
- Robust Digital Watermarking Based on Key-Dependent Basis FunctionsPublished by Springer Nature ,1998
- Clustering Methodologies in Exploratory Data AnalysisPublished by Elsevier ,1980