Robust Homomorphic Video Hashing

by   Priyanka Singh, et al.

The Internet has been weaponized to carry out cybercriminal activities at an unprecedented pace. The rising concerns for preserving the privacy of personal data while availing modern tools and technologies is alarming. End-to-end encrypted solutions are in demand for almost all commercial platforms. On one side, it seems imperative to provide such solutions and give people trust to reliably use these platforms. On the other side, this creates a huge opportunity to carry out unchecked cybercrimes. This paper proposes a robust video hashing technique, scalable and efficient in chalking out matches from an enormous bulk of videos floating on these commercial platforms. The video hash is validated to be robust to common manipulations like scaling, corruptions by noise, compression, and contrast changes that are most probable to happen during transmission. It can also be transformed into the encrypted domain and work on top of encrypted videos without deciphering. Thus, it can serve as a potential forensic tool that can trace the illegal sharing of videos without knowing the underlying content. Hence, it can help preserve privacy and combat cybercrimes such as revenge porn, hateful content, child abuse, or illegal material propagated in a video.



There are no comments yet.


page 1

page 2

page 3

page 4


Towards Reliable Online Clickbait Video Detection: A Content-Agnostic Approach

Online video sharing platforms (e.g., YouTube, Vimeo) have become an inc...

Self-Supervised Video Hashing with Hierarchical Binary Auto-encoder

Existing video hash functions are built on three isolated stages: frame ...

A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images

In this paper, we propose a novel content based-image retrieval scheme a...

Retracing the Flow of the Stream: Investigating Kodi Streaming Services

Kodi is of one of the world's largest open-source streaming platforms fo...

Video Segment Copy Detection Using Memory Constrained Hierarchical Batch-Normalized LSTM Autoencoder

In this report, we introduce a video hashing method for scalable video s...

A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes

Middleboxes in a computer network system inspect and analyse network tra...

Sifter: A Hybrid Workflow for Theme-based Video Curation at Scale

User-generated content platforms curate their vast repositories into the...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.