Advanced meet-in-the-middle preimage attacks: First results on full Tiger, and improved results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage
attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SHA …
attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SHA …
Perceptual image hashing based on virtual watermark detection
This paper proposes a new robust and secure perceptual image hashing technique based
on virtual watermark detection. The idea is justified by the fact that the watermark detector …
on virtual watermark detection. The idea is justified by the fact that the watermark detector …
Robust image hashing using invariants of Tchebichef moments
Y Chen, W Yu, J Feng - Optik, 2014 - Elsevier
The content authenticity is critical for secure transmission of multimedia information. As a
promising solution, perceptual image hashing has gain great attention. In this paper, we …
promising solution, perceptual image hashing has gain great attention. In this paper, we …
[PDF][PDF] Image Hashing Using DWT-CSLBP.
Center Symmetric Local Binary Pattern (CSLBP) is widely used in texture and object
detection, but its utilization in image hashing is still limited. Image hashing is a powerful …
detection, but its utilization in image hashing is still limited. Image hashing is a powerful …
Wave atom transform generated strong image hashing scheme
F Liu, LM Cheng, HY Leung, QK Fu - Optics Communications, 2012 - Elsevier
The rapid development of multimedia technology has resulted in a rising rate on digital
unauthorized utilization and forgery, which makes the situation of image authentication …
unauthorized utilization and forgery, which makes the situation of image authentication …
Image hashing using AQ-CSLBP with double bit quantization
This paper presents a novel image hashing method for authentication and tampering
detection. Creation, modification and transfer of multimedia data becomes an easy task due …
detection. Creation, modification and transfer of multimedia data becomes an easy task due …
Content-based image hashing using wave atoms
F Liu, HY Leung, LM Cheng, XY Ji - Chinese Physics B, 2012 - iopscience.iop.org
It is well known that robustness, fragility, and security are three important criteria of image
hashing; however how to build a system that can strongly meet these three criteria is still a …
hashing; however how to build a system that can strongly meet these three criteria is still a …
Attacks on JH, Grøstl and SMASH Hash Functions
JH and Grøstl hash functions are two of the five finalists in NIST SHA-3 competition. JH-$ s $
and Grøstl-$ s $ are based on a $2 n $ bit compression function and the final output is …
and Grøstl-$ s $ are based on a $2 n $ bit compression function and the final output is …
Sub-images based image hashing with non-negative factorization
S Prungsinchai, F Khelifi… - 2012 19th IEEE …, 2012 - ieeexplore.ieee.org
This paper proposes a robust and secure perceptual image hashing technique based on
random sub-image selection, non-negative matrix factorization and DWT transform where …
random sub-image selection, non-negative matrix factorization and DWT transform where …
Hash function map** design utilizing probability distribution for pre-image resistance
Hash functions are often used to protect the integrity of information. In general, the design of
hash functions should satisfy three standards: pre-image resistance, second pre-image …
hash functions should satisfy three standards: pre-image resistance, second pre-image …