A Survey on Image Hashing for Image Authentication

被引:7
作者
Ou, Yang [1 ]
Rhee, Kyung Hyune [2 ]
机构
[1] Pukyong Natl Univ, Dept Informat Secur, Pusan, South Korea
[2] Pukyong Natl Univ, Div Elect Comp & Telecommun Engn, Pusan, South Korea
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2010年 / E93D卷 / 05期
关键词
image hashing; image authentication; feature extraction; perceptibility; ROBUST; SECURE; WAVELET; SCHEME;
D O I
10.1587/transinf.E93.D.1020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional cryptographic hash functions are sensitive to even one-bit difference of the input message. While multimedia data always undergo compression or other signal processing operations, which lead to the unsuitability of multimedia authentication using cryptographic hash. The image hashing has emerged recently which captures visual essentials for robust image authentication. In this paper, we give a comprehensive survey of image hashing. We present an overview of various image hashing schemes and discuss their advantages and limitations in terms of security, robustness, and discrimination under different types of operations on the image.
引用
收藏
页码:1020 / 1030
页数:11
相关论文
共 50 条
  • [1] Ahmed F, 2007, LECT NOTES COMPUT SC, V4352, P51
  • [2] [Anonymous], IEEE EURASIP WORKSH
  • [3] BLAHUT RE, 1983, THEORY PRACTIVE ERRO
  • [4] The JPEG2000 still image coding system: An overview
    Christopoulos, C
    Skodras, A
    Ebrahimi, T
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) : 1103 - 1127
  • [5] Coskun B., 2006, P 40 ANN C INF SCI S
  • [6] Cover T.M., 2006, ELEMENTS INFORM THEO, V2nd ed
  • [7] Fawcett T, 2004, ROC GRAPHS NOTES PRA
  • [8] Fodor I.K, 2002, SURVEY DIMENSION RED, DOI DOI 10.2172/15002155
  • [9] Fridrich J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P178, DOI 10.1109/ITCC.2000.844203
  • [10] Guo XC, 2007, LECT NOTES COMPUT SC, V4810, P755