We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: A study on the use of perceptual hashing to detect manipulation of embedded messages in images

Abstract: Typically, metadata of images are stored in a specific data segment of the image file. However, to securely detect changes, data can also be embedded within images. This follows the goal to invisibly and robustly embed as much information as possible to, ideally, even survive compression.
This work searches for embedding principles which allow to distinguish between unintended changes by lossy image compression and malicious manipulation of the embedded message based on the change of its perceptual or robust hash. Different embedding and compression algorithms are compared.
The study shows that embedding a message via integer wavelet transform and compression with Karhunen-Loeve-transform yields the best results. However, it was not possible to distinguish between manipulation and compression in all cases.
Comments: 12 pages, 3 figures submitted, accepted and presented at IPCV 2022, subconference of CSCE, this https URL as the publication of the proceedings is delayed, the permission for a (pre-)publication on arxiv was granted this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV)
Cite as: arXiv:2303.00092 [cs.CR]
  (or arXiv:2303.00092v1 [cs.CR] for this version)

Submission history

From: Volker Skwarek [view email]
[v1] Tue, 28 Feb 2023 21:32:49 GMT (3508kb,D)

Link back to: arXiv, form interface, contact.