The traditional cryptographic hash functions are sensitive to even one-bit difference of the input message. While multimedia data always undergo compression or other signal processing operations, which lead to the unsuitability of multimedia authentication using cryptographic hash. The image hashing has emerged recently which captures visual essentials for robust image authentication. In this paper, we give a comprehensive survey of image hashing. We present an overview of various image hashing schemes and discuss their advantages and limitations in terms of security, robustness, and discrimination under different types of operations on the image. Copyright © 2010 The Institute of Electronics, Information and Communication Engineers.
CITATION STYLE
Ou, Y., & Rhee, K. H. (2010). A survey on image hashing for image authentication. In IEICE Transactions on Information and Systems (Vol. E93-D, pp. 1020–1030). Institute of Electronics, Information and Communication, Engineers, IEICE. https://doi.org/10.1587/transinf.E93.D.1020
Mendeley helps you to discover research relevant for your work.