Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Acta Electronica Sinica》 2008-07
Add to Favorite Get Latest Update

An Overview of Perceptual Hashing

NIU Xia-mu,JIAO Yu-hua(Information Countermeasure Research Institute,Harbin Institute of Technology,Harbin,Heilongjiang 150001,China)  
Perceptual hashing is a class of one way mappings from multimedia presentations to a perceptual hash value in terms of their perceptual content.It features the perceptual robustness and security.Perceptual hashing could be applied to multimedia content identification,retrieval,authentication,etc.On the basis of the human perceptual model,definition of perceptual hashing is proposed in this paper,as well as the properties and the general descriptions.Its typical algorithm reviews,application scenarios and benchmark are presented.The prospect of perceptual hashing algorithms and techniques is also discussed.
【Key Words】: perceptual hashing multimedia content multimedia security
【Fund】: 国家自然科学基金(No.60671064 60703011);; 国家863高技术研究发展计划(No.2007AA01Z458);; 高等学校博士学科专项科研基金资助课题(RFDP:20070213047)
【CateGory Index】: TP18
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 HAN Qi,WANG Zhi-fang,NIU Xia-mu,LI Qiong(School of Computer Science and Technology,Harbin Institute of Technology,Harbin,Heilongjiang 150001,China);A Face Region Hierarchical Encryption Algorithm for Palette Images[J];Acta Electronica Sinica;2008-S1
【Co-references】
Chinese Journal Full-text Database 6 Hits
1 HU Yun~1,WU Hong-tao~1,ZHANG Han-yu~1,NIU Xin-xin~(1,2),YANG Yi-xian~(1,2) (1.Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China; and Telecommunications, Beijing 100876, China);A Digital Watermarking Scheme in Huge Index Image[J];Journal of Beijing University of Posts and Telecommunications;2005-01
2 Zhang Weike1 Kong Xiangwei1 You Xingang1,2(1 Information Security Research Center,Dalian University of Technology,Dalian 116024,China)(2 Beijing Institute of Electronic Technology and Application,Beijing 100091, China);Secure and robust image perceptual hashing[J];Journal of Southeast University(Natural Science Edition);2007-S1
3 LUO Qing-yuan1,WANG Xiao-xiao2 (1.School of Water Conservancy and Environment Engineering,Zhengzhou University,Zhengzhou 450002,P.R.China;2.PLA information Engineening University,Zhengzhou 45002,P.R.China);Technique of Digital Signature and Its Application[J];Computer Security;2008-10
4 Chen Huiyan1,2,Wang Lianqiang1,and Lü Shuwang11(State Key Laboratory of Information Security,Graduate University of Chinese Academy of Sciences,Beijing 100080)2(Beijing Electronic Science and Technology Institute,Beijing 100070);A Study of Key Problems of HFE Cryptosystem[J];Journal of Computer Research and Development;2007-07
5 WO Yan 1) HAN Guo Qiang 1) ZHANG Bo 2) 1) (College of Computer Science and Engineering, South China University of Technology, Guangzhou 510641) 2) (Zhongshan Police Office, Zhongshan 528400);A New Feature-Based Image Content Authentication Algorithm[J];Chinese Journal of Computers;2005-01
6 BIAN Guo-chun,ZHANG Xi-huang(School of Information Engineering, Southern Yangtze University, Wuxi Jiangsu 214122, China);Fast retrieval of JPEG images compressed by DCT[J];Computer Applications;2005-07
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved