Share Email Print
cover

Proceedings Paper

A novel evaluation method for perceptual hash algorithm in authentication mode
Author(s): Zhaoqing Liu; Qiong Li; Jingrui Liu; Xiamu Niu
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Perceptual hash is an important research branch of multimedia security, while the evaluation of performance of a perceptual hash algorithm is not well studied so far. The traditional performance of a perceptual hash algorithm is robustness and discriminability. Such evaluation criterion is not good enough to judge an algorithm, especially for a perceptual hash algorithm working in authentication mode. In this paper, anew evaluation method is proposed to evaluate an authentication oriented perceptual hash algorithm by the capability of distinguish the malicious tamper from content preserving operations. A new performance, Identical Perceptual Distance, is also defined to quantize the ability. The thorough test on several representative published perceptual hash algorithms shows the feasibility of the proposed evaluation method.

Paper Details

Date Published: 8 June 2012
PDF: 5 pages
Proc. SPIE 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012), 833444 (8 June 2012); doi: 10.1117/12.968564
Show Author Affiliations
Zhaoqing Liu, Harbin Institute of Technology (China)
Qiong Li, Harbin Institute of Technology (China)
Jingrui Liu, Harbin Institute of Technology (China)
Xiamu Niu, Harbin Institute of Technology (China)


Published in SPIE Proceedings Vol. 8334:
Fourth International Conference on Digital Image Processing (ICDIP 2012)
Mohamed Othman; Sukumar Senthilkumar; Xie Yi, Editor(s)

© SPIE. Terms of Use
Back to Top