【24h】

On the Security of the Visual Hash Function

机译:视觉哈希函数的安全性

获取原文
获取原文并翻译 | 示例

摘要

Robust hash functions are central to the security of multimedia content authentication systems. Such functions are sensitive to a key but robust to many allowed signal processing operations on the underlying content. Robustness of the hash function to changes in the original content implies the existence of a cluster in the feature space around the original contents feature vector, any point within which getting hashed to the same output. The shape and size of the cluster determines the trade-off between the robustness offered and the security of the authentication system based on the robust hash function. The clustering itself is based on a secret key and hence unknown to the attacker. However, we show in this paper that the specific clustering arrived at by a robust hash function may be possible to learn. Specifically, we look at a well known robust hash function for image data called the Visual Hash Function (VHF). Given just an input and its hash value, we show how to construct a statistical model of the hash function, without any knowledge of the secret key used to compute the hash. We also show how to use this model to engineer arbitrary and malicious collisions. Finally, we propose one possible modification to VHF so that constructing a model that mimics its behavior becomes difficult.
机译:强大的哈希功能对于多媒体内容认证系统的安全性至关重要。此类功能对键敏感,但对基础内容上的许多允许的信号处理操作却很健壮。哈希函数对原始内容进行更改的鲁棒性意味着,在原始内容特征向量周围的特征空间中存在一个簇,在该簇中的任何点都将散列到同一输出。群集的形状和大小决定了基于健壮散列函数在提供的健壮性和身份验证系统的安全性之间的权衡。群集本身基于秘密密钥,因此对于攻击者而言是未知的。但是,我们在本文中表明,通过健壮的哈希函数得出的特定聚类可能是可以学习的。具体来说,我们来看一个众所周知的用于图像数据的健壮哈希函数,称为视觉哈希函数(VHF)。仅给出输入及其哈希值,我们将展示如何构建哈希函数的统计模型,而无需了解用于计算哈希的秘密密钥。我们还将展示如何使用此模型来设计任意和恶意冲突。最后,我们提出了对VHF的一种可能的修改,以致于难以构造一个模仿其行为的模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号