A Survey on Image Authentication Techniques

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 7, Issue 4

Abstract

Image authentication is the process of proving image identity and authenticity. Digital images are increasingly transmitted over non-secure channels such as the Internet. Military, medical and quality control images must be protected. To protect the authenticity of images, several approaches have been proposed. Nowadays image authentication techniques have recently gained great attention due to its importance of multimedia applications. The traditional cryptographic hash functions, such as MD5 and SHA-1 are used for authentication. However, these hash functions are not suitable for image authentication. Because they are so sensitive that even one bit change of the input data will lead to a significant change of the output hash. Besides, image authentication system requires the main content sensitive. In order to make up for the disadvantage of the traditional cryptographic hash functions in image authentication, robust image hashing was first introduced which provide good ROC performance, low collision probability.

Authors and Affiliations

S. Jothimani , P. Betty

Keywords

Related Articles

Detection and Localization of Electrical Power Quality Disturbances

Power quality disturbance is an issue that is gaining the attention of researchers, electrical utilities and customers. For developing tools for power quality (PQ) analysis and diagnosis PQ data is required. Therefore th...

 Analysis of Dendrogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional Data

 Most of the data collected by organizations and firms contains multi-attribute and temporal data. Identifying temporal relationships (e.g., trends) in data constitutes an important problem that is relevant in&nbs...

 Red Tacton - A Human Area Networking Technology

 Now a day’s electronic devices become smaller and lower in power Requirements, and they are less expensive. we have begun to adorn our bodies with personal information and communication appliances. Such devices inc...

 Comparision Of Materials For Two-Wheeler Connecting Rod Using Ansys

 Connecting rod is a major link inside of a internal combustion engine. Its primary function is to transmit the push and pull from the piston pin to the crank pin thus converting the reciprocating motion of piston...

 An Overview on Privacy Preserving Data Mining Methodologies

 Abstract— Recent interest in the collection and monitoring of data using data mining technology for the purpose of security and business-related applications has raised serious concerns about privacy issues. For...

Download PDF file
  • EP ID EP126461
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

S. Jothimani, P. Betty (2014). A Survey on Image Authentication Techniques. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 7(4), 184-186. https://europub.co.uk/articles/-A-126461