2010
DOI: 10.1016/j.sigpro.2009.05.024
|View full text |Cite
|
Sign up to set email alerts
|

A secure and robust hash-based scheme for image authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
58
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 161 publications
(58 citation statements)
references
References 16 publications
0
58
0
Order By: Relevance
“…Other similar work based on this approach has recently been proposed (Ahmed et al, 2010) where the authors calculate and record a vector of 4-bits called "Perturbation information". This additional transmitted information has the same dimension of the extracted features.…”
Section: Problem Statementmentioning
confidence: 99%
“…Other similar work based on this approach has recently been proposed (Ahmed et al, 2010) where the authors calculate and record a vector of 4-bits called "Perturbation information". This additional transmitted information has the same dimension of the extracted features.…”
Section: Problem Statementmentioning
confidence: 99%
“…Generally, the image authentication schemes can be classified into two catego− ries: signature−based schemes [7][8][9][10] and fragile water− mark−based schemes [11][12][13][14][15][16][17][18]. In a signature−based scheme, the given image is processed by using the hash function and the hashed result is encrypted by using the public key cry− ptosystem to generate the digital signature.…”
Section: Introductionmentioning
confidence: 99%
“…Lee and Lin proposed the dual watermark for both image tamper detection and image recovery in 2008 [13]. Ahmed and Siyal proposed an image authentication scheme based on the hash function in 2010 [14]. Qi and Xin pro− posed a quantization−based semi−fragile watermarking sche− me for image content authentication in 2011 [15].…”
Section: Introductionmentioning
confidence: 99%
“…Image hashing techniques use data from different domains such as DCT coefficients [5], Wavelet transform coefficients [19] and Fourier transform coefficients [13], [15], Daubechies wavelet transform [3] to generate the signature for image authentication. A digital signature is an encrypted form of the whole data generated from original data.…”
Section: Introductionmentioning
confidence: 99%
“…The secret key is used randomly modulate image pixels to create a transformed feature space. A 4-bit quantization scheme is employed to decrease the size of the hash [19]. Harsh Kumar Sarohi et al have presented perceptual hashing scheme for content based image retrieval.…”
Section: Introductionmentioning
confidence: 99%