2010
DOI: 10.1587/transinf.e93.d.1020
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Image Hashing for Image Authentication

Abstract: SUMMARYThe traditional cryptographic hash functions are sensitive to even one-bit difference of the input message. While multimedia data always undergo compression or other signal processing operations, which lead to the unsuitability of multimedia authentication using cryptographic hash. The image hashing has emerged recently which captures visual essentials for robust image authentication. In this paper, we give a comprehensive survey of image hashing. We present an overview of various image hashing schemes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…We also applied computationally simple average hashing to images, despite the availability of more advanced methods for image fingerprinting (e.g. Ou and Rhee, 2010) and crowdsourcing approaches. This simple approach might have limited the findings but was appropriate for an initial investigation of large-scale image circulation using visual big data analysis methods.…”
Section: Methodsmentioning
confidence: 99%
“…We also applied computationally simple average hashing to images, despite the availability of more advanced methods for image fingerprinting (e.g. Ou and Rhee, 2010) and crowdsourcing approaches. This simple approach might have limited the findings but was appropriate for an initial investigation of large-scale image circulation using visual big data analysis methods.…”
Section: Methodsmentioning
confidence: 99%
“…Embedding a stego message will break the hash and therefore prevent copies to be found. This can be solved by robust or perceptual hashes like discussed in [14] or [16]. With these hashes, multiple copies of images which differ regarding their binary representation, but look identical to a human observer, can be found reliably and efficiently.…”
Section: Research Goalmentioning
confidence: 99%