A review of hashing based image authentication techniques

SA Subhani, RK Karsh, I Mohiul… - Multimedia Tools and …, 2022 - search.proquest.com
In the recent digitization era, image hashing is a key technology, including image
recognition, authentication and manipulation detection, among many multimedia security …

Robust image hashing through DWT-SVD and spectral residual method

RK Karsh, RH Laskar, Aditi - EURASIP Journal on Image and Video …, 2017 - Springer
In the last few decades, the discovery of various methods for generating secure image hash
has become revolutionary in the field of image hashing. This paper presents an efficient …

A novel digital watermarking based on general non-negative matrix factorization

Z Chen, L Li, H Peng, Y Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we propose a novel general non-negative matrix factorization (general-NMF)-
based digital watermarking scheme for copyright protection and integrity authentication of …

Green Extraction of Peppermint as an Antibacterial Agent in Thermosensitive Hydrogel for Diabetic Wound Healing

NS Rahmi, MP Maharani, K Irianto, IA Rizky… - …, 2025 - Wiley Online Library
Diabetic wounds are notoriously problematic to heal, often leading to an increased risk of
infection with conventional wound dressings. To address this problem, thermosensitive …

Testing the Contextual Model of Learning in a Chinese Context

X Zhao - Journal of Museum Education, 2021 - Taylor & Francis
In 2008, China's museums began to offer free admission, which led to an explosive growth
in the number of visitors. As a result, more researchers are examining how to determine the …

Robust Line Based Image Fingerprinting Algorithm

KM Ibraheem - 2021 17th International Computer Engineering …, 2021 - ieeexplore.ieee.org
Image fingerprinting is an important technology that is used by many search engines and
multimedia systems for indexing, copy detection and retrieving images. However, most …

Robust image authentication via locality sensitive hashing with core alignment

Q Ma, L Xu, L Xing, B Wu - Multimedia Tools and Applications, 2018 - Springer
Robust image hashing is a promising technique to represent image's perceptual content.
However, when it comes to image authentication, tradeoff between robustness and …

[PDF][PDF] Feature based image authentication using symmetric surround saliency mapping in image forensics

C Nandini - International Journal of Computer Applications, 2014 - Citeseer
For an efficient image security, image hashing is one of the solutions for image
authentication. A robust image hashing mechanism must be robust to image processing …

An efficient approach towards satellite image retrieval using semantic mining with hashing

LM John, KA Bhandari - International Journal of Applied Information …, 2016 - ijais.org
Satellite images have gained a wide popularity in the field of content-based image retrieval.
A massive amount of these images are collected every year due to the high availability of …

CMS R-CNN: An Efficient Cascade Multi-Scale Region-based Convolutional Neural Network for Accurate 2D Small Vehicle Detection

Z Li, C Wang, Q Wang, W Yang - 2019 Chinese Automation …, 2019 - ieeexplore.ieee.org
In recent years, 2D vehicle detection has experienced impressive progress. Despite of the
outstanding performance achieved by the state-of-the-art methods, it is still very challenging …