Perceptual Video Hashing for Content Identification and Authentication

Fouad Khelifi, Ahmed Bouridane

Research output: Contribution to journalArticlepeer-review

35 Citations (Scopus)
48 Downloads (Pure)

Abstract

Perceptual hashing has been broadly used in the literature to identify similar contents for video copy detection. It has also been adopted to detect malicious manipulations for video authentication. However, targeting both applications with a single system using the same hash would be highly desirable as this saves the storage space and reduces the computational complexity. This paper proposes a perceptual video hashing system for content identification and authentication. The objective is to design a hash extraction technique that can withstand signal processing operations on one hand and detect malicious attacks on the other hand. The proposed system relies on a new signal calibration technique for extracting the hash using the discrete cosine transform (DCT) and the discrete sine transform (DST). This consists of determining the number of samples, called the normalizing shift, that is required for shifting a digital signal so that the shifted version matches a certain pattern according to DCT/DST coefficients. The rationale for the calibration idea is that the normalizing shift resists signal processing operations while it exhibits sensitivity to local tampering (i.e., replacing a small portion of the signal with a different one). While the same hash serves both applications, two different similarity measures have been proposed for video identification and authentication, respectively. Through intensive experiments with various types of video distortions and manipulations, the proposed system has been shown to outperform related state-of-the art video hashing techniques in terms of identification and authentication with the advantageous ability to locate tampered regions.
Original languageEnglish
Article number8116689
Pages (from-to)50-67
Number of pages18
JournalIEEE Transactions on Circuits and Systems for Video Technology
Volume29
Issue number1
Early online date21 Nov 2017
DOIs
Publication statusPublished - 1 Jan 2019

Keywords

  • Authentication
  • forgery detection
  • identification
  • robustness
  • video hashing

Fingerprint

Dive into the research topics of 'Perceptual Video Hashing for Content Identification and Authentication'. Together they form a unique fingerprint.

Cite this