A Survey on Image Authentication Techniques

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 7, Issue 4

Abstract

Image authentication is the process of proving image identity and authenticity. Digital images are increasingly transmitted over non-secure channels such as the Internet. Military, medical and quality control images must be protected. To protect the authenticity of images, several approaches have been proposed. Nowadays image authentication techniques have recently gained great attention due to its importance of multimedia applications. The traditional cryptographic hash functions, such as MD5 and SHA-1 are used for authentication. However, these hash functions are not suitable for image authentication. Because they are so sensitive that even one bit change of the input data will lead to a significant change of the output hash. Besides, image authentication system requires the main content sensitive. In order to make up for the disadvantage of the traditional cryptographic hash functions in image authentication, robust image hashing was first introduced which provide good ROC performance, low collision probability.

Authors and Affiliations

S. Jothimani , P. Betty

Keywords

Related Articles

 Performance Analysis Of Shunt Active Filter Using Different Controllers

 In this paper, Performance of Shunt active power filter (SAPF) is analyzed for various types of non linear loads. Among the various control schemes available for SAPF, indirect current control scheme is used here....

 Inductive Charging Technique

 The fuels like petrol, diesel etc. cost is increasing day by day because of increased number of vehicles and proportional fuel usage. Also the sources of these fuels are depleting in nature. As a solution to this p...

 Design and implementation of DDA architecture for FIR Filters

 Traditionally, direct implementation of a K-tap FIR filter requires K multiply-and-accumulate (MAC) blocks, which are expensive to implement in FPGA due to logic complexity and resource usage. To resolve this issue...

Detection and Localization of Electrical Power Quality Disturbances

Power quality disturbance is an issue that is gaining the attention of researchers, electrical utilities and customers. For developing tools for power quality (PQ) analysis and diagnosis PQ data is required. Therefore th...

 Reduction in routing overhead in MANET using 2-ACK scheme and Novel routing Algorithm

 Mobile Ad hoc Network (MANET) is a collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other via bi-directional wireless links either directly or indirectl...

Download PDF file
  • EP ID EP126461
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

S. Jothimani, P. Betty (2014). A Survey on Image Authentication Techniques. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 7(4), 184-186. https://europub.co.uk/articles/-A-126461