2017
DOI: 10.1007/s11042-017-4809-4
|View full text |Cite
|
Sign up to set email alerts
|

Robust image hashing using progressive feature selection for tampering detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 26 publications
0
9
0
Order By: Relevance
“…Image authentication and tamper localization methods are also proposed. The results in [25] show robustness against different signal processing and geometric attacks. Fei et al [26] proposed a hash-based template matching algorithm for video sequences.…”
Section: Related Workmentioning
confidence: 84%
See 1 more Smart Citation
“…Image authentication and tamper localization methods are also proposed. The results in [25] show robustness against different signal processing and geometric attacks. Fei et al [26] proposed a hash-based template matching algorithm for video sequences.…”
Section: Related Workmentioning
confidence: 84%
“…This is followed by hash construction from features that are extracted through QPCET moments. Pun et al [25] proposed a feature extraction method that combines local features of both structure and colour information. The hash is constructed through Horizontal Location-Context Hashing (HLCH) and Vertical Location-Context Hashing (VLCH) methods.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, this hypothesis was tested. An initial test was carried out on a set of 47 images from the same image pack used by the authors [ 37 ], and the variation of HD with the angle of rotation was plotted. As can be seen in Figure 7 , the results are similar to those presented in that work.…”
Section: Resultsmentioning
confidence: 99%
“…Qin et al [ 36 ] developed a method to attribute a final hash using color vector angle, and it was shown that it is secure even after quantizing and scrambling. Pun et al [ 37 ] designed a method for tampering detection using progressive feature point selection, which filters the key points as opposed to the Scale-Invariant Feature Transform (SIFT) method, and better detects the tamper feature. Dimension reduction-based methods are also compression methods, the difference being that they reduce the dimensional space into a lower one, based on the significance of each dimension.…”
Section: State Of the Artmentioning
confidence: 99%
“…Feature-Based Hashing. Later in 2018, several new techniques based on image features for the hashing algorithm were developed, which include extraction of structural features from color images [37], dual-cross pattern-based textural features [38], progressive feature point selection [39], and a geometric correction-based technique using local and global features to counter the rotation scaling translation (RST) attacks [40]. However, these algorithms are unable to verify the validity of all types of images from all across the globe.…”
Section: Statisticalmentioning
confidence: 99%