skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Secure Image Hash Comparison for Warhead Verification

Abstract

The effort to inspect and verify warheads in the context of possible future arms control treaties is rife with security and implementation issues. In this paper we review prior work on perceptual image hashing for template-based warhead verification. Furthermore, we formalize the notion of perceptual hashes and demonstrate that large classes of such functions are likely not cryptographically secure. We close with a brief discussion of fully homomorphic encryption as an alternative technique.

Authors:
; ;
Publication Date:
Research Org.:
Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1237813
Report Number(s):
PNNL-SA-103277
DN2001000
DOE Contract Number:  
AC05-76RL01830
Resource Type:
Conference
Resource Relation:
Conference: 55th Annual Meeting of the Institute of Nuclear Materials Management (INMM 2014), July 20-24, 2014, Atlanta, Georgia, 1:500-509
Country of Publication:
United States
Language:
English

Citation Formats

Bruillard, Paul J., Jarman, Kenneth D., and Robinson, Sean M. Secure Image Hash Comparison for Warhead Verification. United States: N. p., 2014. Web.
Bruillard, Paul J., Jarman, Kenneth D., & Robinson, Sean M. Secure Image Hash Comparison for Warhead Verification. United States.
Bruillard, Paul J., Jarman, Kenneth D., and Robinson, Sean M. Fri . "Secure Image Hash Comparison for Warhead Verification". United States.
@article{osti_1237813,
title = {Secure Image Hash Comparison for Warhead Verification},
author = {Bruillard, Paul J. and Jarman, Kenneth D. and Robinson, Sean M.},
abstractNote = {The effort to inspect and verify warheads in the context of possible future arms control treaties is rife with security and implementation issues. In this paper we review prior work on perceptual image hashing for template-based warhead verification. Furthermore, we formalize the notion of perceptual hashes and demonstrate that large classes of such functions are likely not cryptographically secure. We close with a brief discussion of fully homomorphic encryption as an alternative technique.},
doi = {},
url = {https://www.osti.gov/biblio/1237813}, journal = {},
number = ,
volume = ,
place = {United States},
year = {2014},
month = {6}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: