2016
DOI: 10.1186/s40064-016-3639-6
|View full text |Cite
|
Sign up to set email alerts
|

Robust image hashing using ring partition-PGNMF and local features

Abstract: BackgroundImage authentication is one of the challenging research areas in the multimedia technology due to the availability of image editing tools. Image hash may be used for image authentication which should be invariant to perceptually similar image and sensitive to content changes. The challenging issue in image hashing is to design a system which simultaneously provides rotation robustness, desirable discrimination, sensitivity and localization of forged area with minimum hash length.MethodsIn this paper,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(10 citation statements)
references
References 42 publications
0
10
0
Order By: Relevance
“…This method can be applied to image authentication and can detect malicious tampering. Karsh et al [22,23] also use global features and local features to generate image hash. The global features are obtained by using ring partition and projected gradient nonnegative 3 matrix factorization [22] or statistical feature distance [23], and the local features are extracted from the salient regions of an image.…”
Section: Related Workmentioning
confidence: 99%
“…This method can be applied to image authentication and can detect malicious tampering. Karsh et al [22,23] also use global features and local features to generate image hash. The global features are obtained by using ring partition and projected gradient nonnegative 3 matrix factorization [22] or statistical feature distance [23], and the local features are extracted from the salient regions of an image.…”
Section: Related Workmentioning
confidence: 99%
“…The hashes are reportedly rotation invariant, robust, and are useful against image security. A robust technique proposed in [19] extracts global and local features using projected gradient non-negative matrix factorization (PNMF) for content preserving objective and localization of the affected area. The propositions in [20] concern local binary pattern (LBP), noise resistant local binary pattern (NRLBP) and center-symmetrical local binary pattern (CSLBP) with singular value decomposition (SVD) for prevention of image tampering.…”
Section: Introductionmentioning
confidence: 99%
“…Following represents various global and local features pairs for content change location locally as well as globally. DWT-SVD and Saliency object detection using spectral residual model; Projected Gradient Non-negative Matrix Factorization (PGNMF), ring partition and saliency detection; Zernike moment and Salient point detection; Zernike moment and Haralick local features; Zernike moments, MOD-LBP and Haralick texture features; Invariant moments from Radon coefficients and statistical measures from Radon coefficients; DCT coefficients of Watson's visual model and SIFT key points; Color vector angle and Salient edge points [5][6][7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%