Share Email Print
cover

Proceedings Paper

Security analysis of robust perceptual hashing
Author(s): Oleksiy Koval; Sviatoslav Voloshynovskiy; Fokko Beekhof; Thierry Pun
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

In this paper we considered the problem of security analysis of robust perceptual hashing in authentication application. The main goal of our analysis was to estimate the amount of trial efforts of the attacker, who is acting within the Kerckhoffs security principle, to reveal a secret key. For this purpose, we proposed to use Shannon equivocation that provides an estimate of complexity of the key search performed based on all available prior information and presented its application to security evaluation of particular robust perceptual hashing algorithms.

Paper Details

Date Published: 18 March 2008
PDF: 10 pages
Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 681906 (18 March 2008); doi: 10.1117/12.764846
Show Author Affiliations
Oleksiy Koval, Univ. of Geneva (Switzerland)
Sviatoslav Voloshynovskiy, Univ. of Geneva (Switzerland)
Fokko Beekhof, Univ. of Geneva (Switzerland)
Thierry Pun, Univ. of Geneva (Switzerland)


Published in SPIE Proceedings Vol. 6819:
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
Edward J. Delp; Ping Wah Wong; Jana Dittmann; Nasir D. Memon, Editor(s)

© SPIE. Terms of Use
Back to Top