1 / 8

DWT Based Robust Image Hashing Algorithm

DWT Based Robust Image Hashing Algorithm. Authors: Yuan-yuan Hu, Xia-mu Niu Source: 2010 6 th International Conference on Network Computer (INC), Gyeongju, South Korea Speaker: Pei-lin Tsou Date: Nov 3 rd , 2010 . Outline. Introduction Proposed Scheme Experimental Results Conclusions.

ballari-taj
Download Presentation

DWT Based Robust Image Hashing Algorithm

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DWT Based Robust Image Hashing Algorithm Authors: Yuan-yuan Hu, Xia-mu Niu Source: 2010 6th International Conference on Network Computer (INC), Gyeongju, South Korea Speaker: Pei-lin Tsou Date: Nov 3rd, 2010 

  2. Outline • Introduction • Proposed Scheme • Experimental Results • Conclusions

  3. Introduction • Robust Hashing: Content-based digital signature of multimedia • Robustness • Fragility

  4. Proposed Scheme Image X 3-level DWT X’

  5. Experimental Results(1/3) (e) 2-D map of XLH ’ (f)2-D map of XHL ’ (g) 2-D map of XHH’ (h) 2-D map of h • Original Image • LH2 sub-band • HL2 sub-band • HH2 sub-band

  6. Experimental Results(2/3) ∙: logic AND + : logic OR

  7. Experimental Results(3/3) • Tampered image • 2-D mapping of the tamper image • Difference of 2D-mapping of original image and query • Localize the tampered region

  8. Conclusions • Robust for mild geometric attacks • Localize the tamped region

More Related