This paper proposes a robust image hashing method which is robust against common image processing attacks and geometric distortion attacks. In order to resist against geometric attacks, the log-polar mapping (LPM) and contourlet transform are employed to obtain the low frequency sub-band image. Then the sub-band image is divided into some non-overlapping blocks, and low and middle frequency coefficients are selected from each block after discrete cosine transform. The singular value decomposition (SVD) is applied in each block to obtain the first digit of the maximum singular value. Finally, the features are scrambled and quantized as the safe hash bits. Experimental results show that the algorithm is not only resistant against common image...
The recent progress in digital multimedia technologies has offered many facilities in transmission, ...
AbstractImage hashing technique constructs a short sequence from the image to represent its contents...
Forensic analysis of image sets today is most often done with the help of cryptographic hashes due t...
This paper proposes a robust image hashing method which is robust against common image processing at...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
Image hashing is an emerging technology for the need of, such as image authentication, digital water...
The proliferation of digital images creates problems for managing large image databases, indexing in...
Traditional image hashing methods can often only resist traditional global geometric attacks and can...
[[abstract]]This paper proposes a robust image hashing method in discrete Fourier domain that can be...
Abstract In the last few decades, the discovery of various methods for generating secure image hash ...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
This paper proposes a robust and secure perceptual image hashing technique based on random sub-image...
With the intensively increasing of digital media new challenges has been created for authentication ...
Abstract—Dimension reduction based techniques, such as singular value decomposition (SVD) and non-ne...
The recent progress in digital multimedia technologies has offered many facilities in transmission, ...
AbstractImage hashing technique constructs a short sequence from the image to represent its contents...
Forensic analysis of image sets today is most often done with the help of cryptographic hashes due t...
This paper proposes a robust image hashing method which is robust against common image processing at...
Image hashing has been a popular alternative of digital watermarking for copyright protection and co...
Image hashing is an emerging technology for the need of, such as image authentication, digital water...
The proliferation of digital images creates problems for managing large image databases, indexing in...
Traditional image hashing methods can often only resist traditional global geometric attacks and can...
[[abstract]]This paper proposes a robust image hashing method in discrete Fourier domain that can be...
Abstract In the last few decades, the discovery of various methods for generating secure image hash ...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
This paper proposes a robust and secure perceptual image hashing technique based on random sub-image...
With the intensively increasing of digital media new challenges has been created for authentication ...
Abstract—Dimension reduction based techniques, such as singular value decomposition (SVD) and non-ne...
The recent progress in digital multimedia technologies has offered many facilities in transmission, ...
AbstractImage hashing technique constructs a short sequence from the image to represent its contents...
Forensic analysis of image sets today is most often done with the help of cryptographic hashes due t...