2007
DOI: 10.1007/s11741-007-0401-2
|View full text |Cite
|
Sign up to set email alerts
|

Recent development of perceptual image hashing

Abstract: The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concern to the academia as well as the industry. On the other hand, efficient search of the huge amount of images has become a great challenge. Image hashing is a technique suitable for use in image authentication and content based image retrieval (CBIR). In this article, we review some representative image has… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…Radial variance hashing judges whether two images are similar by taking the global hash of the images and comparing the Hamming distance of the hashes of two images. The more similar the two images are, the smaller is the Hamming distance of the hash values (Shuo-zhong and Xin-peng, 2007 ). The principle of the hash value calculation algorithm is to perform lossy compression on the original data.…”
Section: Research Methodology and Data Sourcesmentioning
confidence: 99%
“…Radial variance hashing judges whether two images are similar by taking the global hash of the images and comparing the Hamming distance of the hashes of two images. The more similar the two images are, the smaller is the Hamming distance of the hash values (Shuo-zhong and Xin-peng, 2007 ). The principle of the hash value calculation algorithm is to perform lossy compression on the original data.…”
Section: Research Methodology and Data Sourcesmentioning
confidence: 99%
“…Therefore, it is necessary to create new tools and techniques to discover the authenticity and integrity of digital media [1]. In recent decade, several methods have been extensively studied for intellectual property protection of digital images and image forgeries detection including image watermarking-based schemes [2], digital image forensic-based schemes [3] and perceptual image hashing-based schemes [4,5]. For security/authentication of multimedia data, perceptual image hashing is introduced based on traditional cryptosystems.…”
Section: Introductionmentioning
confidence: 99%
“…Perceptual hash has the characteristics that it should remain the same if the images are perceptually looked the same, while different for different images and if unacceptable changes are caused to the images. These characteristics, also named as robustness and discrimination, are very desirable in the case of image authentication (Wang and Zhang 2007). The relationship of cryptographic hash, image hash and perceptual hash is shown in Fig.…”
Section: Introductionmentioning
confidence: 99%