Authentication of an image with sha-1 and invariant vector distances

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The two primary objectives of image authentication are Discrimination and Robustness. The SHA-1 algorithm, invariant vector distance and ring division are implemented to authenticate the image by using hash value to enhance discriminative capability and rotation robustness. The statistical features like central moments of the picture which contains rings in homogenous CIE L*a*b* model are unwavering because the image rotation is not linked to the ring division. Specifically, the digital operations of an image are not changed with respect to Euclidean distance and feature vectors. This makes message digest discriminative and dense. Several tests conducted with more than 200 color images and reveals that for common image digital operations this algorithm for image authentication is strong to estimate the efficiency. Among all the existing hashing algorithms, the projected technique for image authentication is demonstrated as superior.

Cite

CITATION STYLE

APA

Appala Narasimham, A., & Avadhani, P. S. (2019). Authentication of an image with sha-1 and invariant vector distances. International Journal of Innovative Technology and Exploring Engineering, 9(1), 2401–2408. https://doi.org/10.35940/ijitee.A4265.119119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free