A review of hashing based image authentication techniques

SA Subhani, RK Karsh, I Mohiul… - Multimedia Tools and …, 2022 - search.proquest.com
In the recent digitization era, image hashing is a key technology, including image
recognition, authentication and manipulation detection, among many multimedia security …

Robust image hashing with ring partition and invariant vector distance

Z Tang, X Zhang, X Li, S Zhang - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Robustness and discrimination are two of the most important objectives in image hashing.
We incorporate ring partition and invariant vector distance to image hashing algorithm for …

Perceptual hashing for image authentication: A survey

L Du, ATS Ho, R Cong - Signal Processing: Image Communication, 2020 - Elsevier
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …

Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints

C Qin, E Liu, G Feng, X Zhang - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
In this paper, a novel perceptual image hashing scheme based on convolutional neural
network (CNN) with multiple constraints is proposed, in which our deep hashing network …

Image encryption with double spiral scans and chaotic maps

Z Tang, Y Yang, S Xu, C Yu… - Security and …, 2019 - Wiley Online Library
Image encryption is a useful technique of image content protection. In this paper, we
propose a novel image encryption algorithm by jointly exploiting random overlapping block …

Efficient hashing method using 2D-2D PCA for image copy detection

X Liang, Z Tang, Z Huang, X Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Image copy detection is an important technology of copyright protection. This paper
proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …

Fractal coding-based robust and alignment-free fingerprint image hashing

SM Abdullahi, H Wang, T Li - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Biometric image hashing techniques have been widely studied and seen progressive
advancements. However, only a handful of available solutions provide two-factor …

Robust image hashing with multidimensional scaling

Z Tang, Z Huang, X Zhang, H Lao - Signal processing, 2017 - Elsevier
Multidimensional scaling (MDS) is an efficient technique for data analysis, and has been
successfully applied in data visualization, object retrieval, data clustering, and so on …

Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping

C Wang, X Wang, X Chen, C Zhang - Multimedia Tools and Applications, 2017 - Springer
This paper introduces a new zero-watermarking algorithm based on polar complex
exponential transform (PCET) and logistic mapping. This algorithm takes advantage of the …

Unified performance evaluation method for perceptual image hashing

X Li, C Qin, Z Wang, Z Qian… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In recent decades, a large number of perceptual image hashing schemes have been
designed to secure the authenticity and integrity of digital images. However, the feasible …