Sajjad, M.; Ul Haq, I.; Lloret, J.; Ding, W.; Muhammad, K. (2019). Robust Image Hashing Based Efficient Authentication for Smart Industrial Environment. IEEE Transactions on Industrial Informatics. 15(12):6541-6550. https://doi.org/10.1109/TII.2019.2921652
Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10251/188318
Título:
|
Robust Image Hashing Based Efficient Authentication for Smart Industrial Environment
|
Autor:
|
Sajjad, Muhammad
Ul Haq, Ijaz
Lloret, Jaime
Ding, Weiping
Muhammad, Khan
|
Entidad UPV:
|
Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions
|
Fecha difusión:
|
|
Resumen:
|
[EN] Due to large volume and high variability of editing tools, protecting multimedia contents, and ensuring their privacy and authenticity has become an increasingly important issue in cyber-physical security of industrial ...[+]
[EN] Due to large volume and high variability of editing tools, protecting multimedia contents, and ensuring their privacy and authenticity has become an increasingly important issue in cyber-physical security of industrial environments, especially industrial surveillance. The approaches authenticating images using their principle content emerge as popular authentication techniques in industrial video surveillance applications. But maintaining a good tradeoff between perceptual robustness and discriminations is the key research challenge in image hashing approaches. In this paper, a robust image hashing method is proposed for efficient authentication of keyframes extracted from surveillance video data. A novel feature extraction strategy is employed in the proposed image hashing approach for authentication by extracting two important features: the positions of rich and nonzero low edge blocks and the dominant discrete cosine transform (DCT) coefficients of the corresponding rich edge blocks, keeping the computational cost at minimum. Extensive experiments conducted from different perspectives suggest that the proposed approach provides a trustworthy and secure way of multimedia data transmission over surveillance networks. Further, the results vindicate the suitability of our proposal for real-time authentication and embedded security in smart industrial applications compared to state-of-the-art methods.
[-]
|
Palabras clave:
|
Image edge detection
,
Authentication
,
Surveillance
,
Feature extraction
,
Gray-scale, Robustness, Digital authentication, Embedded security, Image hashing
,
Industrial surveillance
|
Derechos de uso:
|
Reserva de todos los derechos
|
Fuente:
|
IEEE Transactions on Industrial Informatics. (issn:
1551-3203
)
|
DOI:
|
10.1109/TII.2019.2921652
|
Editorial:
|
Institute of Electrical and Electronics Engineers
|
Versión del editor:
|
https://doi.org/10.1109/TII.2019.2921652
|
Código del Proyecto:
|
info:eu-repo/grantAgreement/NSFC//61976120/
info:eu-repo/grantAgreement/Natural Science Foundation of Jiangsu Province//BK20191445/
info:eu-repo/grantAgreement/Six Talent Peaks Project in Jiangsu Province//XYDXXJS-048/
|
Agradecimientos:
|
This work was supported in part by the National Natural Science Foundation of China under Grant 61976120, in part by the Natural Science Foundation of Jiangsu Province under Grant BK20191445, in part by the Six Talent Peaks ...[+]
This work was supported in part by the National Natural Science Foundation of China under Grant 61976120, in part by the Natural Science Foundation of Jiangsu Province under Grant BK20191445, in part by the Six Talent Peaks Project of Jiangsu Province under Grant XYDXXJS-048, and sponsored by Qing Lan Project of Jiangsu Province, China.
[-]
|
Tipo:
|
Artículo
|