A review of hashing based image authentication techniques

SA Subhani, RK Karsh, I Mohiul… - Multimedia Tools and …, 2022 - search.proquest.com
In the recent digitization era, image hashing is a key technology, including image
recognition, authentication and manipulation detection, among many multimedia security …

Robust image hashing with ring partition and invariant vector distance

Z Tang, X Zhang, X Li, S Zhang - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Robustness and discrimination are two of the most important objectives in image hashing.
We incorporate ring partition and invariant vector distance to image hashing algorithm for …

Perceptual hashing for image authentication: A survey

L Du, ATS Ho, R Cong - Signal Processing: Image Communication, 2020 - Elsevier
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …

Robust hashing for image authentication using Zernike moments and local features

Y Zhao, S Wang, X Zhang, H Yao - IEEE transactions on …, 2012 - ieeexplore.ieee.org
A robust hashing method is developed for detecting image forgery including removal,
insertion, and replacement of objects, and abnormal color modification, and for locating the …

Robust image hashing with tensor decomposition

Z Tang, L Chen, X Zhang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper presents a new image hashing that is designed with tensor decomposition (TD),
referred to as TD hashing, where image hash generation is viewed as deriving a compact …

Robust perceptual image hashing based on ring partition and NMF

Z Tang, X Zhang, S Zhang - IEEE transactions on knowledge …, 2013 - ieeexplore.ieee.org
This paper designs an efficient image hashing with a ring partition and a nonnegative matrix
factorization (NMF), which has both the rotation robustness and good discriminative …

Fractal coding-based robust and alignment-free fingerprint image hashing

SM Abdullahi, H Wang, T Li - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Biometric image hashing techniques have been widely studied and seen progressive
advancements. However, only a handful of available solutions provide two-factor …

Robust image hashing with multidimensional scaling

Z Tang, Z Huang, X Zhang, H Lao - Signal processing, 2017 - Elsevier
Multidimensional scaling (MDS) is an efficient technique for data analysis, and has been
successfully applied in data visualization, object retrieval, data clustering, and so on …

Perceptual image hashing using center-symmetric local binary patterns

R Davarzani, S Mozaffari, K Yaghmaie - Multimedia Tools and …, 2016 - Springer
Perceptual image hashing finds increasing attention in several multimedia security
applications such as image identification/authentication, tamper detection, and …

Robust image hashing based on color vector angle and Canny operator

Z Tang, L Huang, X Zhang, H Lao - AEU-International Journal of …, 2016 - Elsevier
Image hashing is a novel technology of multimedia processing, and finds many applications,
such as image forensics, image retrieval and image indexing. Conventional image hashing …