Share Email Print

Proceedings Paper

Security of the visual hash function
Author(s): Regunathan Radhakrishnan; Ziyou Xiong; Nasir D. Memon
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Robust hash functions are central to the security of multimedia content authentication systems. Such functions are sensitive to a key but robust to many allowed signal processing operations on the underlying content. Robustness of the hash function to changes in the original content implies the existence of a cluster in the feature space around the original contents feature vector, any point within which getting hashed to the same output. The shape and size of the cluster determines the trade-off between the robustness offered and the security of the authentication system based on the robust hash function. The clustering itself is based on a secret key and hence unknown to the attacker. However, we show in this paper that the specific clustering arrived at by a robust hash function may be possible to learn. Specifically, we look at a well known robust hash function for image data called the Visual Hash Function (VHF). Given just an input and its hash value, we show how to construct a statistical model of the hash function, without any knowledge of the secret key used to compute the hash. We also show how to use this model to engineer arbitrary and malicious collisions. Finally, we propose one possible modification to VHF so that constructing a model that mimics its behavior becomes difficult.

Paper Details

Date Published: 20 June 2003
PDF: 9 pages
Proc. SPIE 5020, Security and Watermarking of Multimedia Contents V, (20 June 2003); doi: 10.1117/12.477340
Show Author Affiliations
Regunathan Radhakrishnan, Polytechnic Univ. (United States)
Ziyou Xiong, Univ. of Illinois/Urbana-Champaign (United States)
Nasir D. Memon, Polytechnic Univ. (United States)

Published in SPIE Proceedings Vol. 5020:
Security and Watermarking of Multimedia Contents V
Edward J. Delp III; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?