A survey on image hashing for image authentication

10Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

The traditional cryptographic hash functions are sensitive to even one-bit difference of the input message. While multimedia data always undergo compression or other signal processing operations, which lead to the unsuitability of multimedia authentication using cryptographic hash. The image hashing has emerged recently which captures visual essentials for robust image authentication. In this paper, we give a comprehensive survey of image hashing. We present an overview of various image hashing schemes and discuss their advantages and limitations in terms of security, robustness, and discrimination under different types of operations on the image. Copyright © 2010 The Institute of Electronics, Information and Communication Engineers.

Cite

CITATION STYLE

APA

Ou, Y., & Rhee, K. H. (2010). A survey on image hashing for image authentication. In IEICE Transactions on Information and Systems (Vol. E93-D, pp. 1020–1030). Institute of Electronics, Information and Communication, Engineers, IEICE. https://doi.org/10.1587/transinf.E93.D.1020

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free