Digital multimedia such as images and videos are prevalent on today's internet and cause significant
social impact, which can be evidenced by the proliferation of social networking sites with user generated
contents. Due to the ease of generating and modifying images and videos, it is critical to establish
trustworthiness for online multimedia information. In this paper, we propose novel approaches to
perform multimedia forensics using compact side information to reconstruct the processing history of
a document. We refer to this as FASHION, standing for Forensic hASH for informatION assurance.
Based on the Radon transform and scale space theory, the proposed forensic hash is compact and
can effectively estimate the parameters of geometric transforms and detect local tampering that an
image may have undergone. Forensic hash is designed to answer a broader range of questions regarding
the processing history of multimedia data than the simple binary decision from traditional robust
image hashing, and also offers more efficient and accurate forensic analysis than multimedia forensic
techniques that do not use any side information.
Performing information retrieval tasks while preserving data confidentiality is a desirable capability when a
database is stored on a server maintained by a third-party service provider. This paper addresses the problem
of enabling content-based retrieval over encrypted multimedia databases. Search indexes, along with multimedia
documents, are first encrypted by the content owner and then stored onto the server. Through jointly applying
cryptographic techniques, such as order preserving encryption and randomized hash functions, with image
processing and information retrieval techniques, secure indexing schemes are designed to provide both privacy
protection and rank-ordered search capability. Retrieval results on an encrypted color image database and security
analysis of the secure indexing schemes under different attack models show that data confidentiality can
be preserved while retaining very good retrieval performance. This work has promising applications in secure
multimedia management.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.