A Survey on Image Authentication Techniques
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 7, Issue 4
Abstract
Image authentication is the process of proving image identity and authenticity. Digital images are increasingly transmitted over non-secure channels such as the Internet. Military, medical and quality control images must be protected. To protect the authenticity of images, several approaches have been proposed. Nowadays image authentication techniques have recently gained great attention due to its importance of multimedia applications. The traditional cryptographic hash functions, such as MD5 and SHA-1 are used for authentication. However, these hash functions are not suitable for image authentication. Because they are so sensitive that even one bit change of the input data will lead to a significant change of the output hash. Besides, image authentication system requires the main content sensitive. In order to make up for the disadvantage of the traditional cryptographic hash functions in image authentication, robust image hashing was first introduced which provide good ROC performance, low collision probability.
Authors and Affiliations
S. Jothimani , P. Betty
An Efficient Encrypted Data Searching Over Out Sourced Data
Searching data over Out sourcing is still an important research issue in the field of cloud computing or service oriented application ,because of retrieving the user interesting and relevant results based on the user q...
A Review: CEST Method Based Analysis for the Detection of Damaged Buildings in Crisis Areas
This paper describes new combined method that consists of a cooperative approach of several different algorithms for automated change detection. Remote sensing data are primary sources extensively used for change d...
Automatic Normalization of Punjabi Words
For any language in the world, automatic normalization of words is a basic linguistic resource required to develop any type of application in Natural Language Processing (NLP) with high accuracy like: machine translation...
Distributed Transformer Monitoring System Based On Zigbee Technology
A distributed transformer networks remote monitoring system(DTRMS) is developed and constructed, for monitor and record the parameters like temperature, oil level status, of a distribution transformer. The system c...
An Edge Detection Algorithm based on Fuzzy Logic
Edges characterize boundaries and are therefore considered for prime importance in image processing. Edge detection filters out useless data, noise and frequencies while preserving the important structural pro...