scispace - formally typeset
Proceedings ArticleDOI

Image authentication using soft hashing technique

Reads0
Chats0
TLDR
An image hashing technique that attempts to simultaneously address the robustness, fragility and security issues is presented and an improved version of this scheme with a wavelet-based smoothening to improve robustness against JPEG compression and a modified intensity-transformation for enhancing the security.
Abstract
Designing a hash function for multimedia authentication encompasses many issues like robustness to non- malicious distortion, sensitivity to detect malicious manipulations and security In this paper, we present an image hashing technique that attempts to simultaneously address the robustness, fragility and security issues This scheme is an improved version of our previously proposed scheme [1] with a wavelet-based smoothening to improve robustness against JPEG compression and a modified intensity-transformation for enhancing the security Several experimental results are presented to demonstrate the effectiveness of the proposed scheme

read more

Citations
More filters
Journal ArticleDOI

A secure and robust hash-based scheme for image authentication

TL;DR: The proposed hash-based image authentication scheme uses secret key to randomly modulate image pixels to create a transformed feature space to calculate the image hash, which can detect minute tampering with localization of the tampered area.
DissertationDOI

Encryption, authentication and copyright protection techniques for digital images.

Fawad Ahmed.
TL;DR: A JPEG compression tolerant image encryption scheme is proposed using some very interesting properties of orthogonal matrices that provides high level of security against various cryptographic attacks, and in addition, can also tolerate JPEG compression.
References
More filters
Journal ArticleDOI

A robust image authentication method distinguishing JPEG compression from malicious manipulation

TL;DR: An effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression, and describes adaptive methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling.
Journal ArticleDOI

Secret and public key image watermarking schemes for image authentication and ownership verification

TL;DR: A watermarking scheme for ownership verification and authentication that requires a user key during both the insertion and the extraction procedures, and which can detect any modification made to the image and indicate the specific locations that have been modified.
Journal ArticleDOI

Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes

TL;DR: It is shown that oblivious watermarking techniques that embed information into a host image in a block-wise independent fashion are vulnerable to a counterfeiting attack.
Journal ArticleDOI

Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs

TL;DR: The proposed image hashing paradigm using visually significant feature points is proposed, which withstands standard benchmark attacks, including compression, geometric distortions of scaling and small-angle rotation, and common signal-processing operations.
Proceedings ArticleDOI

A robust soft hash algorithm for digital image signature

TL;DR: The radon transform and principal component analysis are used to extract characteristics robust against geometrical transformation (rotation and scaling) and image processing attacks (compression, filtering, blurring).
Related Papers (5)