Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








43 Hits in 3.2 sec

Image Hashing for Tamper Detection with Multiview Embedding and Perceptual Saliency

Ling Du, Zhen Chen, Yongzhen Ke
2018 Advances in Multimedia  
Perceptual hashing technique for tamper detection has been intensively investigated owing to the speed and memory efficiency.  ...  Our method calculates the image hashing distance by taking into account the perceptual saliency rather than directly considering the distance value between total images.  ...  [5] proposed a quaternion-based image hashing for tampering localization. Four types of feature maps are selected for quaternion image formation.  ... 
doi:10.1155/2018/4235268 fatcat:lrh6tquth5dn7ndiwbakncyfnm

An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding

Ling Du, Zehong He, Yijing Wang, Xiaochao Wang, Anthony T. S. Ho
2020 Algorithms  
In this paper, we propose an image hashing method based on multi-attack reference generation and adaptive thresholding for image authentication.  ...  Furthermore, we introduce the concept of adaptive thresholding to account for variations in hashing distance.  ...  RPIVD-based image hashing Quaternion-based image hashing [12] : This method considers multiple features, and constructs a quaternion image to implement a quaternion Fourier transform for hashing generation  ... 
doi:10.3390/a13090227 fatcat:azx4arjwvjhifi47wgoej256gm

A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication

Abdul Subhani Shaik, Ram Kumar Karsh, Mohiul Islam, Surendra Pal Singh, Shaohua Wan
2022 Wireless Communications and Mobile Computing  
Subsequently, tampered localization is done by comparing the decoder output of the manipulated image with the hash of the actual image.  ...  In recent times, the image hashing algorithm has gained popularity for image authentication applications.  ...  , CMR College of Engineering & Technology, Hyderabad, India, for providing valuable suggestions and essential facilities in completing this work.  ... 
doi:10.1155/2022/1645658 fatcat:qchb745jwzgntes3zc3uhwzf2e

Perceptual image hashing based on three-dimensional global features and image energy

Xiaoran Yuan, Yan Zhao
2021 IEEE Access  
INDEX TERMS Image hashing, image energy, three-dimensional global features, tampered detection  ...  In order to improve classification performance and operating efficiency of the hash algorithm, this paper proposes a novel hash algorithm that combines three-dimensional global features and local energy  ...  BASED ON LOCAL FEATURE POINTS Qin et al.  ... 
doi:10.1109/access.2021.3069045 fatcat:yfamgreyx5gzhld7qieqqcoviq

Robust image hashing through DWT-SVD and spectral residual method

Ram Kumar Karsh, R. H. Laskar, Aditi
2017 EURASIP Journal on Image and Video Processing  
The latest image hashing technique based on ring partition and invariant vector distance is rotation invariant for the large angle at the cost of being insensitive to corner forgery.  ...  In the last few decades, the discovery of various methods for generating secure image hash has become revolutionary in the field of image hashing.  ...  Acknowledgements The authors would like to acknowledge people of Speech and Image Processing Laboratory, National Institute of Technology Silchar, India, for providing support and necessary facilities  ... 
doi:10.1186/s13640-017-0179-0 fatcat:z7twyq6jxndrpf4y2fvvxdii6q

Image Fragile Watermarking through Quaternion Linear Transform in Secret Space

Marco Botta, Davide Cavagnino, Victor Pomponiu
2017 Journal of Imaging  
In this paper, we apply the quaternion framework for color images to a fragile watermarking algorithm with the objective of multimedia integrity protection (Quaternion Karhunen-Loève Transform Fragile  ...  The algorithm, based on the Quaternion Karhunen-Loève Transform (QKLT), embeds a binary watermark into some QKLT coefficients representing a host image in a secret frequency space: the QKLT basis images  ...  Quaternion-Based Watermarking The first application of quaternions for robust digital watermarking was within the Fourier framework.  ... 
doi:10.3390/jimaging3030034 fatcat:crn33fawenep3o34pt6tyecske

Perceptual Hashing-Based Robust Image Authentication Scheme for Wireless Multimedia Sensor Networks

Hongxia Wang, Bangxu Yin
2013 International Journal of Distributed Sensor Networks  
In this paper, we propose a perceptual hashing-based robust image authentication scheme, which applies the distributed processing strategy for perceptual image hashes and can provide compactness, visual  ...  for image authentication purpose.  ...  Robust Local Feature Points Based on Gravity Center of Random Blocks.  ... 
doi:10.1155/2013/791814 fatcat:g3ktlu5j5rhqxh7xq3ktjeq7ym

A Thorough Investigation on Image Forgery Detection

Anjani Kumar Rai, Subodh Srivastava
2023 CMES - Computer Modeling in Engineering & Sciences  
The demand for authenticity and the integrity of the image drive the detection of a fabricated image.  ...  This work will help us to find the best forgery detection technique based on the different environments.  ...  The block matching process is based on locality-sensitive hashing.  ... 
doi:10.32604/cmes.2022.020920 fatcat:u7bvtghwlvadvcaw62ay5ywm3e

Robust image hashing using ring partition-PGNMF and local features

Ram Kumar Karsh, R. H. Laskar, Bhanu Bhai Richhariya
2016 SpringerPlus  
Methods: In this paper, a perceptually robust image hashing technique based on global and local features has been proposed.  ...  Image hash may be used for image authentication which should be invariant to perceptually similar image and sensitive to content changes.  ...  Acknowledgements The authors would like to acknowledge people of Speech and Image Processing Laboratory, National Institute of Technology Silchar, India for providing support and necessary facilities for  ... 
doi:10.1186/s40064-016-3639-6 pmid:27933251 pmcid:PMC5118381 fatcat:5wgupgo32zhadjjmp76z4p5fwq

Robust Image Hashing with Low-Rank Representation and Ring Partition

Zhenjun Tang, Zixuan Yu, Zhixin Li, Chunqiang Yu, Xianquan Zhang
2020 Wireless Communications and Mobile Computing  
Image hashing has attracted much attention of the community of multimedia security in the past years.  ...  This paper presents a novel image hashing with low-rank representation (LRR) and ring partition.  ...  Acknowledgments This work is partially supported by the National Natural Science Foundation of China (61962008, 61762017, and 61966004), the Guangxi "Bagui Scholar" Team for Innovation and Research, the  ... 
doi:10.1155/2020/8870467 fatcat:zbemnfv5ivhilatos5xffux4wy

Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification

Ricardo Fitas, Bernardo Rocha, Valter Costa, Armando Sousa
2021 Journal of Imaging  
Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort.  ...  To tackle this problem, the present work designs and compares hashing-assisted image matching methods that can be used in cork stopper authentication.  ...  The authors gratefully acknowledge the funding of project POCI-01-0145-FEDER-032460 (GRIS: grain refinement induced by electromagnetic stirring: Development of a Predictive Approach for Co-Cr Medical Implants  ... 
doi:10.3390/jimaging7030048 pmid:34460704 pmcid:PMC8321315 fatcat:uqkphjs6c5bj3ppwyscdeah36u

A Novel Video Copyright Protection Scheme Based on Blockchain and Double Watermarking

Jingjing Zheng, Shuhua Teng, Peirong Li, Wei Ou, Donghao Zhou, Jun Ye, Honghao Gao
2021 Security and Communication Networks  
Moreover, based on the characteristics of the fragile watermarking, we accurately locate the attacked video's tamper position and complete the integrity authentication of the watermarked video.  ...  We use the image correlation coefficient method to extract video keyframes.  ...  [23] proposed a block adaptive compressed sensing reversible watermarking algorithm based on the trade-off between high embedding capacity and invisibility of digital image reversible watermark.  ... 
doi:10.1155/2021/6493306 fatcat:j3e4d6sjsjaibdzlnxbymq7p3y

Detection of Image Seam Carving Using a Novel Pattern

Ming Lu, Shaozhang Niu
2019 Computational Intelligence and Neuroscience  
Based on this, a forensic approach for image seam carving is proposed in this paper.  ...  Seam carving is an excellent content-aware image resizing technology widely used, and it is also a means of image tampering.  ...  [11] introduced LDP (local derivative pattern) to detect tampering, and the effect is improved compared with previous methods. e content-adaptive detection method proposed in reference [12] can locate  ... 
doi:10.1155/2019/9492358 pmid:31827494 pmcid:PMC6885291 fatcat:cpn5c2x6yjfhlcqoneqdms5gfa

Insights on Schemes towards Image Counterfeit Attacks & Their Effectiveness

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
This paper reviews significant schemas pertaining to image forensics where the prime emphasize has been laid towards exploring the mechanisms which identify image counterfeit with higher accuracy.  ...  The extensive review of literature also provides better insight into the design aspects associated with the conventional techniques which are defensive against counterfeit image attacks.  ...  .  It incorporates block-based and key-point based schemas for counterfeit image detection  Applies adaptive segmentation and feature mapping.  ... 
doi:10.35940/ijitee.c8451.019320 fatcat:o5wyk6ao4bf7refupdqo7wwd5q

A hybrid approach to find cloned objects in copy move forged images

Ashish Kumar Chakraverti, Vijay Dhir
2019 International Journal of Forensic Software Engineering  
In two step process, we have preprocessed the object image by the proposed dynamic block size technique based local contrast modification and contrast limited adaptive histogram equalisation (DBST-LCM  ...  In this paper, we have proposed a new hybrid approach to detect the cloned object in images. In copy-move forgery, images are forged by making the clone of objects of the same image within the image.  ...  Before hybridisation target image is pre-processed by proposed dynamic block size technique-based local contrast modification and contrast limited adaptive histogram equalisation (DBST-LCM CLAHE), this  ... 
doi:10.1504/ijfse.2019.104705 fatcat:lcb3w7ytjjdo3jqrbsqlhzrefa
« Previous Showing results 1 — 15 out of 43 results