Framework for Enhanced Digital Image Transmission Security: Integrating Hu Moments, Digital Watermarking, and Cryptographic Hashing for Integrity Verification

O Dorgham, S Aburass, GF Issa - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Image stability is very important in a time when digital image communication is essential to
many fields. Modern online dangers are often too complicated for old security methods to …

A novel watermarking approach for protecting image integrity based on a hybrid security technique

AM Nagm, M Torky, KY Youssef - arXiv preprint arXiv:2110.08777, 2021 - arxiv.org
Digital Photo images are everywhere around us in journals, on walls, and over the Internet.
However we have to be conscious that seeing does not always imply reality. Photo images …

An integrity verification system for images using hashing and watermarking

S Vasu, SN George, PP Deepthi - … International Conference on …, 2012 - ieeexplore.ieee.org
Integrity verification is verifying the originality of an object. A number of robust and secure
image hashing methods are existing in literature, which are suited for integrity verification of …

Securing Digital Image with Authentication Code

SC Muraharirao, ML Das - Computer Vision and Image Processing in …, 2014 - igi-global.com
The recent advances in multimedia technology demand protection of digital images from
unintentional manipulation for content integrity, copyright, and ownership. Digital …

Digital Signature Based Control Integrity for JPEG HDR Images

M Hachani, AO Zaid - Computer Analysis of Images and Patterns: 18th …, 2019 - Springer
Abstract “A ship is always safe at the shore, but that is not what it is built for.”-Albert Einstein.
The same philosophy is applied to picture files saved safety on storage devices. This is …

Hash-based authentication of digital images in noisy channels

F Ahmed, A Anees - Robust image authentication in the presence of noise, 2015 - Springer
The advancement in digital technology has provided us with a number of software tools that
can be used to tamper digital media contents, for example, images. This creates several …

A Review of Robust Hashing Methods for Content Based Image Authentication

LN Vadlamudi, RPV Vaddella… - i-manager's Journal on …, 2016 - search.proquest.com
At present, the multimedia data will be transmitted rapidly using an internet. But, whether the
data reaches the recipient without tampering is questionable. The current multimedia editing …

Printout verification using a new image hash algorithm based on Radon, Wavelet, and Fast Fourier transforms

P Athichitsakul, S Phimoltares… - … Conference on Control …, 2015 - ieeexplore.ieee.org
Certificate and document issuing processes are often in a form of printing document to a
paper. Some might improve the trustworthiness of their paper via using secure paper or …

Content-based image authentication: current status, issues, and challenges

SH Han, CH Chu - International Journal of Information Security, 2010 - Springer
With today's global digital environment, the Internet is readily accessible anytime from
everywhere, so does the digital image manipulation software; thus, digital data is easy to be …

A novel image hash algorithm resistant to print–scan

D Wu, X Zhou, X Niu - Signal processing, 2009 - Elsevier
With the rapid development of multimedia technology, how to establish the integrity of
images has become an unavoidable problem. The transform between a digital image and its …