2016
DOI: 10.1016/j.sigpro.2015.10.027
|View full text |Cite
|
Sign up to set email alerts
|

Multi-scale image hashing using adaptive local feature extraction for robust tampering detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 69 publications
(26 citation statements)
references
References 23 publications
0
26
0
Order By: Relevance
“…Content integrity of multimedia data has been tackled in the past from the perspective of manipulation prevention using watermarking, authentication and hashing [1,17,19,21]. Most of such work is aimed at detecting tampered data, especially images, and approaches to recover the original data.…”
Section: Related Workmentioning
confidence: 99%
“…Content integrity of multimedia data has been tackled in the past from the perspective of manipulation prevention using watermarking, authentication and hashing [1,17,19,21]. Most of such work is aimed at detecting tampered data, especially images, and approaches to recover the original data.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, a number of perceptual hash algorithms have been proposed to meet the requirements of different types of data [2][3][4][5][6][7][8][9][10][11][12][13][14][15]. Ahmed et al [2] propose a perceptual hash algorithm for image authentication, which uses a secret key to randomly modulate image pixels to create a transformed feature space.…”
Section: Introductionmentioning
confidence: 99%
“…The proposed method is robust to a wide range of distortions and attacks, and it yields better identification performances under geometric attacks such as rotation attacks and brightness changes. Yan et al [5] propose a multi-scale image hashing method by using the location-context information of the features generated by adaptive and local feature extraction techniques. Cui et al [6] propose a hash algorithm for 3D images by selecting suitable Dual-tree complex wavelet transform coefficients to form the final hash sequence.…”
Section: Introductionmentioning
confidence: 99%
“…That has become a routine practice in many image hashing methods. Many previous schemes are either based on global [2][3][4][5] or local [6][7][8][9][10][11] features. In this paper, we propose a method to construct robust image hashing method using features of selected effective blocks.…”
Section: Introductionmentioning
confidence: 99%