A review of hashing based image authentication techniques

SA Subhani, RK Karsh, I Mohiul… - Multimedia Tools and …, 2022 - search.proquest.com
In the recent digitization era, image hashing is a key technology, including image
recognition, authentication and manipulation detection, among many multimedia security …

A Secure and Robust Autoencoder‐Based Perceptual Image Hashing for Image Authentication

AS Shaik, RK Karsh, M Islam… - … and Mobile Computing, 2022 - Wiley Online Library
With the advancement of technology, it has become easier to modify or tamper with digital
data effortlessly. In recent times, the image hashing algorithm has gained popularity for …

Robust image hashing using exact Gaussian–Hermite moments

KM Hosny, YM Khedr, WI Khedr… - IET Image …, 2018 - Wiley Online Library
In this work, a new method for robust image hashing is presented. The objectives of image
hash are robustness and uniqueness. Exact Gaussian–Hermite moments and their …

Robust color image hashing using quaternion polar complex exponential transform for image authentication

KM Hosny, YM Khedr, WI Khedr… - Circuits, Systems, and …, 2018 - Springer
Image hashing is one of the multimedia protection techniques. In this paper, a new method
for robust image hashing based on quaternion polar complex exponential transform …

Perceptual image hashing using transform domain noise resistant local binary pattern

SQ Abbas, F Ahmed, YPP Chen - Multimedia Tools and Applications, 2021 - Springer
Abstract A new Discrete Cosine Transform (DCT) domain Perceptual Image Hashing (PIH)
scheme is proposed in this paper. PIH schemes are designed to extract a set of features …

[PDF][PDF] Image Hashing Using DWT-CSLBP.

VH Patil, TK Sarode - J. Comput., 2019 - jcomputers.us
Center Symmetric Local Binary Pattern (CSLBP) is widely used in texture and object
detection, but its utilization in image hashing is still limited. Image hashing is a powerful …

Rotation invariant image authentication using Haralick features

K Alice, N Ramaraj, SP Rajagopalan - Multimedia tools and Applications, 2020 - Springer
The image authentication plays a vital role in modern multimedia technology. The existing
technique for preserving authentication abided the content only by preserving …

Image hashing by LoG-QCSLBP

V Patil, T Sarode - Proceedings of the 2nd International Conference on …, 2016 - dl.acm.org
This paper presents an image hashing algorithm for authentication and tampering based on
texture features. Center Symmetric Local Binary Pattern (CSLBP) feature is computationally …

Анализ текущего состояния научных исследований в области робастного хэширования изображений

АВ Козачок, СА Копылов, РВ Мещеряков… - Компьютерная …, 2017 - cyberleninka.ru
Развитие концепции интернета вещей привело к существенному росту объемов
обрабатываемой информации. Значительную часть данных, циркулирующих в …

Image hashing by SDQ-CSLBP

V Patil, T Sarode - 2016 International Conference on Advances …, 2016 - ieeexplore.ieee.org
Approach for image hashing is to use powerful feature descriptor which captures essence of
an image. Applications of image hashing lies in the area of content authentication, structural …