2015
DOI: 10.1007/s11042-015-2591-8
|View full text |Cite
|
Sign up to set email alerts
|

Robust hash generation technique for content-based image authentication using histogram

Abstract: In this paper, a robust hash technique for image content authentication using histogram is proposed. The histogram based hash techniques reported in the literature are robust against Content Preserving Manipulations as well as incidental distortion. The major drawback of these techniques is that, they are not sensitive to Content Changing Manipulations and also un-altered histogram image modifications. To overcome these drawbacks, we present a novel hash technique which divides the image into non-overlapped bl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…Another similar approach is presented in [23], a perceptual hashing scheme for color images with hybrid feature extraction mechanism is proposed which generates shorter hash lengths than [14] with slightly lower AUC but the limitation is the much lengthy hybrid hashing steps which make the computational time very high. A robust image hashing method based on partial sum of histogram bins is elaborated in [24] as histogram hashing.…”
Section: Review Of Image Hashing Shows That Researchers Have Worked Omentioning
confidence: 99%
See 3 more Smart Citations
“…Another similar approach is presented in [23], a perceptual hashing scheme for color images with hybrid feature extraction mechanism is proposed which generates shorter hash lengths than [14] with slightly lower AUC but the limitation is the much lengthy hybrid hashing steps which make the computational time very high. A robust image hashing method based on partial sum of histogram bins is elaborated in [24] as histogram hashing.…”
Section: Review Of Image Hashing Shows That Researchers Have Worked Omentioning
confidence: 99%
“…Area under ROC curve (AUC) is a measure of the efficiency of ROC. Table 5 illustrates the comparison of AUC and hash length of proposed method with some latest schemes [14,[23][24][25]. We provided the hash length in both binary bits and decimal digits for K = 21 .…”
Section: Receiver Operating Characteristicsmentioning
confidence: 99%
See 2 more Smart Citations
“…The robustness of the hashes means that hashes remain the same or change a little after the perceptual content preserving operations are being conducted. For example, Lokanadham Naidu Vadlamudi et al [20] proposed a robust hash algorithm by using features of histogram for image authentication. Due to the robustness and sensitivity of this kind of method, it is much superior to the other three methods when it comes to the network packet loss phenomenon in 5G networks.…”
Section: Introductionmentioning
confidence: 99%