A Survey on Image Authentication Techniques
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 7, Issue 4
Abstract
Image authentication is the process of proving image identity and authenticity. Digital images are increasingly transmitted over non-secure channels such as the Internet. Military, medical and quality control images must be protected. To protect the authenticity of images, several approaches have been proposed. Nowadays image authentication techniques have recently gained great attention due to its importance of multimedia applications. The traditional cryptographic hash functions, such as MD5 and SHA-1 are used for authentication. However, these hash functions are not suitable for image authentication. Because they are so sensitive that even one bit change of the input data will lead to a significant change of the output hash. Besides, image authentication system requires the main content sensitive. In order to make up for the disadvantage of the traditional cryptographic hash functions in image authentication, robust image hashing was first introduced which provide good ROC performance, low collision probability.
Authors and Affiliations
S. Jothimani , P. Betty
Approximating Number of Hidden layer neurons in Multiple Hidden Layer BPNN Architecture
Hidden layers plays a vital role in the performance of Back Propagation Neural Network especially in the case where problems related to arbitrary decision boundary to arbitrary accuracy with rational activation fun...
Efficiency of Corrosion Inhibitors on Cathodic Protection System
This study is on experiment being carried out to determine the efficiency of in inhibitors on catholically protected medium carbon steel in sea water in Bonny and Ogbokoro in the Niger Delta region of Nigeria. The experi...
Effects of Wireless Electricity on Human Bodies
In the near future we will live in a world with no power cables. The innovation of wireless electricity started way back in 2007 at MIT. The CEO of MIT-inspired WiTricity, Eric Giler has a plan to beam electric pow...
ECG Signal Analysis: Different Approaches
In recent years scientists and engineers are facing several challenges in solving biomedical problems and making Digital Signal Processing as an essential and effective pedagogical approach to solve a problem of detectin...
VOICE OPERATED OUTDOOR NAVIGATION SYSTEM FOR VISUALLY IMPAIRED PERSONS
Blind People uses white canes to aid in obstacle detection & avoidance. Guide dogs can also be of limited aid for finding the way to a remote location. So our goal is to create a portable, simple less costly sy...