108
Views
3
CrossRef citations to date
0
Altmetric
Articles

Collusion and rotation resilient video hashing based on scale invariant feature transform

&
Pages 62-74 | Received 23 Jun 2016, Accepted 08 Nov 2016, Published online: 15 Mar 2017

References

  • Mirza HH, Thai HD, Nakao Z. Multi-color channel video watermarking. Bull Facul Engg. 2008;69:65–69.
  • Liu S, Chen DBW, Ji L, et al. A real-time video watermarking algorithm for authentication of small-business wireless surveillance networks. Int J Distrib Sens Netw. 2015;789536:1–11.
  • Chen Q, Tian J, Yang L, et al. A robust video hash scheme based on 2D-DCT temporal maximum occurrence. Secur Commun Netw. 2011;4:1369–1377. doi: 10.1002/sec.264
  • Mihcak MK, Venkatesan RA. Perceptual audio hashing algorithm: a tool for robust audio identification and information hiding. Lect Notes Comput Sci. 2001;2137:51–65. doi: 10.1007/3-540-45496-9_5
  • Ozer H, Sankur B, Memon N, et al. Perceptual audio hashing functions. EURASIP J Adv Sig Process. 2005;2005:1780–1793. doi: 10.1155/ASP.2005.1780
  • Swaminathan A, Mao Y, Wu M. Robust and secure image hashing. IEEE Trans Inf Forensics Sec. 2006;1:215–230. doi: 10.1109/TIFS.2006.873601
  • Lu S, Hsu CY. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Mult Syst. 2005;11:159–173. doi: 10.1007/s00530-005-0199-y
  • Coskun B, Sankur B. Robust video hash extraction. Proceedings IEEE International Conference on ‘Signal processing and communications applications’; USA; 2004. p. 292–295.
  • Coskun B, Sankur B, Memon N. Spatio-temporal transform based video hashing. IEEE Trans Mult. 2006;8:1190–1208. doi: 10.1109/TMM.2006.884614
  • Stalling W. Cryptography and network security. 4th ed. New Delhi, India: Pearson Education; 2006.
  • Xiang S, Yang J, Huang J. Perceptual video hashing robust against geometric distortions. Sci China Inf Sci. 2012;55:1520–1527. doi: 10.1007/s11432-011-4450-1
  • Saikia N, Bora PK. Robust video hashing using the 3D-DWT. Proceedings National Conference Communications (NCC); Jan 28–30; IISc Bangalore, India; 2011. p. 29–30.
  • Vadavalli RK, Bora PK. Perceptual video hashing based on 3D SPIHT coding of 3D DWT coefficients. Proceedings National Conference Communications (NCC); IIT Bombay, India; 2008. p. 1–3.
  • Roover CD, Vleeschouwer CD, Lefebvre F, et al. Key frame radial projection for robust video hashing. IEEE Trans Sig Process. 2005;53:4020–4037. doi: 10.1109/TSP.2005.855414
  • Yang G, Chen N, Jiang Q. A robust hashing algorithm based on SURF for video copy detection. Comput Sec. 2012;31:33–39. doi: 10.1016/j.cose.2011.11.004
  • Weng L, Preneel B. From image hashing to video hashing. Bol S, et al., editors. Adv Mult Model. 2010;5916:662–668. doi: 10.1007/978-3-642-11301-7_66
  • Nie XS, Liu J, Sun JD, et al. Robust video hashing based on double-layer embedding. IEEE Sig Proc Lett. 2011;18:307–310. doi: 10.1109/LSP.2011.2126020
  • Zhou X, Schmucker M, Brown CL. Perceptual hashing of video content based on differential block similarity. Hao, et al., editors. Comput Intell Sec. 2005;3802:80–85.
  • Sandeep R, Sharma S, Thakur M, et al. Perceptual video hashing based on tucker decomposition with application to indexing and retrieval of near-identical videos. Mult Tools Appl. 2016;75:7779–7797. doi: 10.1007/s11042-015-2695-1
  • Li M, Monga V. Twofold video hashing with automatic synchronization. IEEE Trans Inf Foren Sec. 2015;10:1727–1738. doi: 10.1109/TIFS.2015.2425362
  • Sun J, Liu X, Wan W, et al. Video hashing based on appearance and attention features fusion via DBN. Neurocomputing. 2016;213:84–94. doi: 10.1016/j.neucom.2016.05.098
  • Wang W, Sun J, Liu J. A memorability based method for video hashing. Proceedings IEEE International Conferences on ‘Communication technology’; Hangzhou; 2015. p. 309–313.
  • Lowe DG. Distinctive image features from scale invariant key-points. Int J Comput Vis. 2004;60:91–110. doi: 10.1023/B:VISI.0000029664.99615.94
  • Sadek RA. SVD based image processing applications: state of the art, contributions and research challenges. Int J Adv Comput Sci Appl. 2012;3:26–34.
  • Choi YS, Park JY. Image hash generation method using hierarchical histogram. Mult Tools Appl. 2012;61:181–194. doi: 10.1007/s11042-010-0724-7
  • Xiph, https://media.xiph.org/video/derf/ (accessed 5 January 2016).
  • Youtube, http://www.youtube.com (accessed 5 January 2016).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.