A study on the use of perceptual hashing to detect manipulation of embedded messages in images

Link:
Autor/in:
Verlag/Körperschaft:
Arxiv.org
Erscheinungsjahr:
2023
Medientyp:
Text
Schlagworte:
  • Computer Science
  • Cryptography and Security
  • Computer Vision and Pattern Recognition
  • 004: Informatik
  • ddc:004
Beschreibung:
  • Typically, metadata of images are stored in a specific data segment of the image file. However, to securely detect changes, data can also be embedded within images. This follows the goal to invisibly and robustly embed as much information as possible to, ideally, even survive compression. This work searches for embedding principles which allow to distinguish between unintended changes by lossy image compression and malicious manipulation of the embedded message based on the change of its perceptual or robust hash. Different embedding and compression algorithms are compared. The study shows that embedding a message via integer wavelet transform and compression with Karhunen-Loeve-transform yields the best results. However, it was not possible to distinguish between manipulation and compression in all cases.
  • PeerReviewed
Lizenz:
  • https://creativecommons.org/licenses/by-sa/4.0/
Quellsystem:
ReposIt

Interne Metadaten
Quelldatensatz
oai:reposit.haw-hamburg.de:20.500.12738/13979