Proceedings of the 9th Workshop on Multimedia &Amp; Security - MM&Sec '07 2007
DOI: 10.1145/1288869.1288886
|View full text |Cite
|
Sign up to set email alerts
|

Histogram-based image hashing scheme robust against geometric deformations

Abstract: In this paper, we propose a robust image hash algorithm by using the invariance of the image histogram shape to geometric deformations. Robustness and uniqueness of the proposed hash function are investigated in detail by representing the histogram shape as the relative relations in the number of pixels among groups of two different bins. It is found from extensive testing that the histogram-based hash function has a satisfactory performance to various geometric deformations, and is also robust to most common … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
78
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 84 publications
(78 citation statements)
references
References 16 publications
(27 reference statements)
0
78
0
Order By: Relevance
“…The common preprocessing operations include image downsampling [7], low-pass filtering for reducing high frequency signals [8], resizing for image rescaling, order statistic filtering for denoising [9], and Gaussian blurring [10]. As such, all above operations serve for the next essential attributes extraction stage.…”
Section: General Framework Of Image Hashingmentioning
confidence: 99%
See 3 more Smart Citations
“…The common preprocessing operations include image downsampling [7], low-pass filtering for reducing high frequency signals [8], resizing for image rescaling, order statistic filtering for denoising [9], and Gaussian blurring [10]. As such, all above operations serve for the next essential attributes extraction stage.…”
Section: General Framework Of Image Hashingmentioning
confidence: 99%
“…Hence, the feature extraction stage is significantly important in order to achieve robustness, discrimination and security. Some of the robust feature extraction methods exploited in literature include image histogram [10], feature points [11] or image edge information, significant DWT or DCT coefficients, Fourier transform [8], and dimensionality reduction with linear transforms [12].…”
Section: General Framework Of Image Hashingmentioning
confidence: 99%
See 2 more Smart Citations
“…In a robust histogram based image hashing scheme, the robustness of the hash against geometric deformations is achieved by using the histogram shape invariance. Real-world image authentication is not possible with this approach [3].…”
Section: Introductionmentioning
confidence: 99%