skip to main content
10.1145/1456520.1456532acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

A decision theoretic framework for analyzing binary hash-based content identification systems

Published: 27 October 2008 Publication History

Abstract

Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of content. Several content identification techniques based on watermarking or robust hashes have been proposed in the literature, but they have mostly been evaluated through experiments. This paper analyzes binary hash-based content identification schemes under a decision theoretic framework and presents a lower bound on the length of the hash required to correctly identify multimedia content that may have undergone modifications. A practical scheme for content identification is evaluated under the proposed framework. The results obtained through experiments agree very well with the performance suggested by the theoretical analysis.

References

[1]
Youtube:http://www.youtube.com.
[2]
Wall Street Journal:YouTube Removes 30,000 Files Amid Japanese Copyright Concerns. http://online.wsj.com/article/SB116133637777798831.html.
[3]
MusicBrainz:http://www.musicbrainz.org/.
[4]
Verizon VCAST Song ID: http://solutions.vzwshop.com/songid/.
[5]
S. Baluja and M. Covell. Content Fingerprinting using Wavelets. In Proc. of IET Conf. on Multimedia London, England, November 2006.
[6]
M. Barni and F. Bartolini. Data Hiding for Fighting Piracy. IEEE Signal Processing Magazine 21(2):28--39, March 2004.
[7]
O. Chum, J. Philbin, M. Isard, and A. Zisserman. Scalable Near Identical Image and Shot Detection. In ACM Int'l Conf. on Image and Video Retrieval Amsterdam, July 2007.
[8]
E. Cohen, M. Datar, S. Fujiwara, A. Gionis, P. Indyk, R. Motwani, J. Ullman,and C.Yang. Finding Interesting Associations without Support Pruning. IEEE Trans. on Knowledge and Data Engineering 13(1):64--78, January 2001.
[9]
B. Coskun, B. Sankur, and N. Memon. Spatio-temporal Transform Based Video Hashing. IEEE Trans. on Multimedia 8(6):1190--1208, Dec. 2006.
[10]
A. Gionis, P. Indyk, and R. Motwani. Similarity Search in High Dimensions via Hashing.In Proc. of the Int'l Conf. on Very Large Databases pages 518--529, 1999.
[11]
J. Haitsma and T. Kalker. A Highly Robust Audio Fingerprinting System. In Proc. of the Int'l Symposium on Music Information Retrieval Paris, France, 2002.
[12]
J. Hernandez and F. Perez-Gonzalez. Statistical Analysis of Watermarking Schemes for Copyright Protection of Images. Proc. of the IEEE 87(7):1142--1166, July 1999.
[13]
C. E. Jacobs, A. Finkelstein, and D. H. Salesin.Fast Multiresolution Image Querying.In Proc. of the 22nd Annual Conf. on Computer Graphics and Interactive Techniques pages 277--286, New York, USA, 1995.
[14]
S. Mallat. A Theory for Multiresolution Signal Decomposition: the Wavelet Representation. IEEE Trans. on Pattern Analysis and Machine Intelligence 11(7):674--693, July 1989.
[15]
S. Mallat. A Wavelet Tour of Signal Processing Academic Press, second edition, 1999.
[16]
E. McCarthy, F. Balado, G. Slvestre, and N. Hurley. A framework for Soft Hashing and its Application to Robust Image Hashing. In IEEE Int'l Conf. on Image Proc. volume 1, pages 397--400, Oct. 2004.
[17]
M. K. Mihçak and R. Venkatesan. New Iterative Geometric Methods for Robust Perceptual Image Hashing. In ACM Workshop on Security and Privacy in Digital Rights Management 2001.
[18]
J. Oostveen, T. Kalker, and J. Haitsma. Feature Extraction and a Database Strategy for Video Fingerprinting. In Proc. of the 5th Int'l Conf. on Recent Advances in Visual Information Systems, Lecture Notes in Computer Science volume 2314, pages 117--128, 2002.
[19]
H. V. Poor. An Introduction to Signal Detection and Estimation Springer, second edition,1994.
[20]
S. Voloshynovskiy, O. Koval, F. Beekhof, and T. Pun. Robust Perceptual Hashing as Classification Problem: Decision-theoretic and Practical Considerations. In IEEE Workshop on Multimedia Signal Processing pages 345--348, Oct. 2007.

Cited By

View all
  • (2024)A robust self-supervised image hashing method for content identification with forensic detection of content-preserving manipulationsNeural Networks10.1016/j.neunet.2024.106357177:COnline publication date: 1-Sep-2024
  • (2022)Performance Analysis for Biometric Identification Systems with Nonlegitimate Users2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC53654.2022.9945401(3060-3065)Online publication date: 9-Oct-2022
  • (2022)Robust image hashing for content identification through contrastive self-supervised learningNeural Networks10.1016/j.neunet.2022.09.028156:C(81-94)Online publication date: 1-Dec-2022
  • Show More Cited By

Index Terms

  1. A decision theoretic framework for analyzing binary hash-based content identification systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      DRM '08: Proceedings of the 8th ACM workshop on Digital rights management
      October 2008
      102 pages
      ISBN:9781605582900
      DOI:10.1145/1456520
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 October 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. content fingerprinting
      2. content identification
      3. decision theory

      Qualifiers

      • Research-article

      Conference

      CCS08
      Sponsor:

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A robust self-supervised image hashing method for content identification with forensic detection of content-preserving manipulationsNeural Networks10.1016/j.neunet.2024.106357177:COnline publication date: 1-Sep-2024
      • (2022)Performance Analysis for Biometric Identification Systems with Nonlegitimate Users2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC53654.2022.9945401(3060-3065)Online publication date: 9-Oct-2022
      • (2022)Robust image hashing for content identification through contrastive self-supervised learningNeural Networks10.1016/j.neunet.2022.09.028156:C(81-94)Online publication date: 1-Dec-2022
      • (2020)Robust and Secure Image Fingerprinting Learned by Neural NetworkIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2019.289096630:2(362-375)Online publication date: Feb-2020
      • (2012)A Fast Approximate Nearest Neighbor Search Algorithm in the Hamming SpaceIEEE Transactions on Pattern Analysis and Machine Intelligence10.1109/TPAMI.2012.17034:12(2481-2488)Online publication date: 1-Dec-2012
      • (2012)Performance Analysis of Content-Based Identification Using Constrained List-Based DecodingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2012.22060267:5(1652-1667)Online publication date: 1-Oct-2012
      • (2011)Modeling and Analysis of Correlated Binary Fingerprints for Content IdentificationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2011.21523946:3(1146-1159)Online publication date: 1-Sep-2011
      • (2011)On multiple hypothesis testing with rejection option2011 IEEE Information Theory Workshop10.1109/ITW.2011.6089531(75-79)Online publication date: Oct-2011
      • (2011)Identification in desynchronization channels2011 IEEE Information Theory Workshop10.1109/ITW.2011.6089440(297-301)Online publication date: Oct-2011
      • (2011)Information-theoretic analysis of desynchronization invariant object identification2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP.2011.5947271(4168-4171)Online publication date: May-2011
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media