A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Image Hashing for Tamper Detection with Multiview Embedding and Perceptual Saliency
2018
Advances in Multimedia
Perceptual hashing technique for tamper detection has been intensively investigated owing to the speed and memory efficiency. ...
Our method calculates the image hashing distance by taking into account the perceptual saliency rather than directly considering the distance value between total images. ...
[5] proposed a quaternion-based image hashing for tampering localization. Four types of feature maps are selected for quaternion image formation. ...
doi:10.1155/2018/4235268
fatcat:lrh6tquth5dn7ndiwbakncyfnm
An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding
2020
Algorithms
In this paper, we propose an image hashing method based on multi-attack reference generation and adaptive thresholding for image authentication. ...
Furthermore, we introduce the concept of adaptive thresholding to account for variations in hashing distance. ...
RPIVD-based image hashing Quaternion-based image hashing [12] : This method considers multiple features, and constructs a quaternion image to implement a quaternion Fourier transform for hashing generation ...
doi:10.3390/a13090227
fatcat:azx4arjwvjhifi47wgoej256gm
A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication
2022
Wireless Communications and Mobile Computing
Subsequently, tampered localization is done by comparing the decoder output of the manipulated image with the hash of the actual image. ...
In recent times, the image hashing algorithm has gained popularity for image authentication applications. ...
, CMR College of Engineering & Technology, Hyderabad, India, for providing valuable suggestions and essential facilities in completing this work. ...
doi:10.1155/2022/1645658
fatcat:qchb745jwzgntes3zc3uhwzf2e
Perceptual image hashing based on three-dimensional global features and image energy
2021
IEEE Access
INDEX TERMS Image hashing, image energy, three-dimensional global features, tampered detection ...
In order to improve classification performance and operating efficiency of the hash algorithm, this paper proposes a novel hash algorithm that combines three-dimensional global features and local energy ...
BASED ON LOCAL FEATURE POINTS Qin et al. ...
doi:10.1109/access.2021.3069045
fatcat:yfamgreyx5gzhld7qieqqcoviq
Robust image hashing through DWT-SVD and spectral residual method
2017
EURASIP Journal on Image and Video Processing
The latest image hashing technique based on ring partition and invariant vector distance is rotation invariant for the large angle at the cost of being insensitive to corner forgery. ...
In the last few decades, the discovery of various methods for generating secure image hash has become revolutionary in the field of image hashing. ...
Acknowledgements The authors would like to acknowledge people of Speech and Image Processing Laboratory, National Institute of Technology Silchar, India, for providing support and necessary facilities ...
doi:10.1186/s13640-017-0179-0
fatcat:z7twyq6jxndrpf4y2fvvxdii6q
Image Fragile Watermarking through Quaternion Linear Transform in Secret Space
2017
Journal of Imaging
In this paper, we apply the quaternion framework for color images to a fragile watermarking algorithm with the objective of multimedia integrity protection (Quaternion Karhunen-Loève Transform Fragile ...
The algorithm, based on the Quaternion Karhunen-Loève Transform (QKLT), embeds a binary watermark into some QKLT coefficients representing a host image in a secret frequency space: the QKLT basis images ...
Quaternion-Based Watermarking The first application of quaternions for robust digital watermarking was within the Fourier framework. ...
doi:10.3390/jimaging3030034
fatcat:crn33fawenep3o34pt6tyecske
Perceptual Hashing-Based Robust Image Authentication Scheme for Wireless Multimedia Sensor Networks
2013
International Journal of Distributed Sensor Networks
In this paper, we propose a perceptual hashing-based robust image authentication scheme, which applies the distributed processing strategy for perceptual image hashes and can provide compactness, visual ...
for image authentication purpose. ...
Robust Local Feature Points Based on Gravity Center of Random Blocks. ...
doi:10.1155/2013/791814
fatcat:g3ktlu5j5rhqxh7xq3ktjeq7ym
A Thorough Investigation on Image Forgery Detection
2023
CMES - Computer Modeling in Engineering & Sciences
The demand for authenticity and the integrity of the image drive the detection of a fabricated image. ...
This work will help us to find the best forgery detection technique based on the different environments. ...
The block matching process is based on locality-sensitive hashing. ...
doi:10.32604/cmes.2022.020920
fatcat:u7bvtghwlvadvcaw62ay5ywm3e
Robust image hashing using ring partition-PGNMF and local features
2016
SpringerPlus
Methods: In this paper, a perceptually robust image hashing technique based on global and local features has been proposed. ...
Image hash may be used for image authentication which should be invariant to perceptually similar image and sensitive to content changes. ...
Acknowledgements The authors would like to acknowledge people of Speech and Image Processing Laboratory, National Institute of Technology Silchar, India for providing support and necessary facilities for ...
doi:10.1186/s40064-016-3639-6
pmid:27933251
pmcid:PMC5118381
fatcat:5wgupgo32zhadjjmp76z4p5fwq
Robust Image Hashing with Low-Rank Representation and Ring Partition
2020
Wireless Communications and Mobile Computing
Image hashing has attracted much attention of the community of multimedia security in the past years. ...
This paper presents a novel image hashing with low-rank representation (LRR) and ring partition. ...
Acknowledgments This work is partially supported by the National Natural Science Foundation of China (61962008, 61762017, and 61966004), the Guangxi "Bagui Scholar" Team for Innovation and Research, the ...
doi:10.1155/2020/8870467
fatcat:zbemnfv5ivhilatos5xffux4wy
Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification
2021
Journal of Imaging
Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. ...
To tackle this problem, the present work designs and compares hashing-assisted image matching methods that can be used in cork stopper authentication. ...
The authors gratefully acknowledge the funding of project POCI-01-0145-FEDER-032460 (GRIS: grain refinement induced by electromagnetic stirring: Development of a Predictive Approach for Co-Cr Medical Implants ...
doi:10.3390/jimaging7030048
pmid:34460704
pmcid:PMC8321315
fatcat:uqkphjs6c5bj3ppwyscdeah36u
A Novel Video Copyright Protection Scheme Based on Blockchain and Double Watermarking
2021
Security and Communication Networks
Moreover, based on the characteristics of the fragile watermarking, we accurately locate the attacked video's tamper position and complete the integrity authentication of the watermarked video. ...
We use the image correlation coefficient method to extract video keyframes. ...
[23] proposed a block adaptive compressed sensing reversible watermarking algorithm based on the trade-off between high embedding capacity and invisibility of digital image reversible watermark. ...
doi:10.1155/2021/6493306
fatcat:j3e4d6sjsjaibdzlnxbymq7p3y
Detection of Image Seam Carving Using a Novel Pattern
2019
Computational Intelligence and Neuroscience
Based on this, a forensic approach for image seam carving is proposed in this paper. ...
Seam carving is an excellent content-aware image resizing technology widely used, and it is also a means of image tampering. ...
[11] introduced LDP (local derivative pattern) to detect tampering, and the effect is improved compared with previous methods. e content-adaptive detection method proposed in reference [12] can locate ...
doi:10.1155/2019/9492358
pmid:31827494
pmcid:PMC6885291
fatcat:cpn5c2x6yjfhlcqoneqdms5gfa
Insights on Schemes towards Image Counterfeit Attacks & Their Effectiveness
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
This paper reviews significant schemas pertaining to image forensics where the prime emphasize has been laid towards exploring the mechanisms which identify image counterfeit with higher accuracy. ...
The extensive review of literature also provides better insight into the design aspects associated with the conventional techniques which are defensive against counterfeit image attacks. ...
. It incorporates block-based and key-point based schemas for counterfeit image detection Applies adaptive segmentation and feature mapping. ...
doi:10.35940/ijitee.c8451.019320
fatcat:o5wyk6ao4bf7refupdqo7wwd5q
A hybrid approach to find cloned objects in copy move forged images
2019
International Journal of Forensic Software Engineering
In two step process, we have preprocessed the object image by the proposed dynamic block size technique based local contrast modification and contrast limited adaptive histogram equalisation (DBST-LCM ...
In this paper, we have proposed a new hybrid approach to detect the cloned object in images. In copy-move forgery, images are forged by making the clone of objects of the same image within the image. ...
Before hybridisation target image is pre-processed by proposed dynamic block size technique-based local contrast modification and contrast limited adaptive histogram equalisation (DBST-LCM CLAHE), this ...
doi:10.1504/ijfse.2019.104705
fatcat:lcb3w7ytjjdo3jqrbsqlhzrefa
« Previous
Showing results 1 — 15 out of 43 results