A Survey on Image Authentication Techniques

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 7, Issue 4

Abstract

Image authentication is the process of proving image identity and authenticity. Digital images are increasingly transmitted over non-secure channels such as the Internet. Military, medical and quality control images must be protected. To protect the authenticity of images, several approaches have been proposed. Nowadays image authentication techniques have recently gained great attention due to its importance of multimedia applications. The traditional cryptographic hash functions, such as MD5 and SHA-1 are used for authentication. However, these hash functions are not suitable for image authentication. Because they are so sensitive that even one bit change of the input data will lead to a significant change of the output hash. Besides, image authentication system requires the main content sensitive. In order to make up for the disadvantage of the traditional cryptographic hash functions in image authentication, robust image hashing was first introduced which provide good ROC performance, low collision probability.

Authors and Affiliations

S. Jothimani , P. Betty

Keywords

Related Articles

Zigbee Based Wireless Air Pollution Monitoring System Using Low Cost and Energy Efficient Sensors

Air pollution is a major environmental health problem affecting the developing and the developed countries alike. The effects of air pollution on health are very complex as there are many different sources and their indi...

A Review on Redesign of Drive System for Textile Powerloom Machine to Prevent Downtime and Improve Reliability of System

The textile industry is one of the most complicated manufacturing industries because it is a fragmented and heterogeneous sector dominated by small and medium enterprises. A loom is a tool used for weaving yarn into text...

A Study on Dynamic Source Routing in Ad Hoc Wireless Networks

The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organ...

 Manufacturing System: Flexibility Perspective

 Manufacturing, Planning and Control systems are one of the key that determine development of modern production systems. The article presents the importance of flexibility factor in the process of manufacturing, pla...

 A Survey on Security Services In Cloud Computing

 Cloud Computing has brought an incredible change in operations of the IT industries. The cloud computing has benefited the IT industries with less infrastructure investment and maintenance. As cloud provides serv...

Download PDF file
  • EP ID EP126461
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

S. Jothimani, P. Betty (2014). A Survey on Image Authentication Techniques. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 7(4), 184-186. https://europub.co.uk/articles/-A-126461