JOURNAL ARTICLE

<title>Soft multimedia content authentication using the distance-preserving hash function</title>

Dahua XieC.‐C. Jay Kuo

Year: 2004 Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Vol: 5600 Pages: 172-181   Publisher: SPIE

Abstract

A new paradigm of one-way hash function, called the distance-preserving hash function (DP hash function), is proposed and a soft multimedia content authentication scheme is developed accordingly in this work. The DP hash function has a distinct characteristic from regular hash functions. That is, when it is equipped with a correct key, the difference between two outputs reflects the distance between the corresponding inputs. However, if a wrong key value is used, the DP hash function reduces to a regular one-way hash function. We examine the theoretical aspect of the DP hash function and propose a practical way for its construction. The DP hash value of the multimedia feature vector is used as the authenticator for the corresponding content. By comparing the DP hash of received data and the received DP hash (authenticator), users can obtain the error between the received data and the original data. This error information indicates a degree of authenticity and allows users to render a soft decision rather than an "authentic or non-authentic" hard decision. Such a soft decision is helpful in applications where a small amount of distortion in the target data is acceptable, such as digital audio and video.

Keywords:
Hash function Hash chain Computer science SHA-2 Double hashing Cryptographic hash function Function (biology) Authentication (law) Hash table Rolling hash Key (lock) Theoretical computer science Algorithm Computer security

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.12
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Digital Media Forensic Detection
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

<title>Authentication techniques for multimedia content</title>

Nasir MemonPoorvi L. Vora

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 1999 Vol: 3528 Pages: 412-422
JOURNAL ARTICLE

<title>Multimedia content management</title>

Mohamed Abdel-MottalebS. KrishnamachariGandhimathi VaithilingamKavitha V. Devara

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 2001 Vol: 4209 Pages: 48-58
JOURNAL ARTICLE

<title>Security of visual hash function</title>

Regunathan RadhakrishnanZiyou XiongNasir Memon

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 2003 Vol: 5020 Pages: 644-652
JOURNAL ARTICLE

<title>VQ-based digital signature scheme for multimedia content authentication</title>

Qibin SunDi ZhongShih-Fu ChangJiankang WuArcot Desai Narasimhalu

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 2000 Vol: 3971 Pages: 404-416
JOURNAL ARTICLE

<title>Limitations and requirements of content-based multimedia authentication systems</title>

Chai Wah Wu

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 2001 Vol: 4314 Pages: 241-252
© 2026 ScienceGate Book Chapters — All rights reserved.