“…Digital images are used in a wide range of applications for the past two decades and as a result of that many image editing applications challenges the security and integrity of images. There are many ways a hash can be generated by extracting local and global features [4],fixed point theory [7], watermarking methods [3] [8], NMF [9] [12], using fourier mellin transformation [12],DFT coefficients, radon transform co efficient as hash code [15],image histogram [13],DWT coefficients [3], [21] and much more. In recent work combining two or more hashing techniques to generate the hash code is also most common to make advantage of different hashing techniques [20].…”