A Survey on Image Authentication Techniques
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 7, Issue 4
Abstract
Image authentication is the process of proving image identity and authenticity. Digital images are increasingly transmitted over non-secure channels such as the Internet. Military, medical and quality control images must be protected. To protect the authenticity of images, several approaches have been proposed. Nowadays image authentication techniques have recently gained great attention due to its importance of multimedia applications. The traditional cryptographic hash functions, such as MD5 and SHA-1 are used for authentication. However, these hash functions are not suitable for image authentication. Because they are so sensitive that even one bit change of the input data will lead to a significant change of the output hash. Besides, image authentication system requires the main content sensitive. In order to make up for the disadvantage of the traditional cryptographic hash functions in image authentication, robust image hashing was first introduced which provide good ROC performance, low collision probability.
Authors and Affiliations
S. Jothimani , P. Betty
CFD ANALYSIS OF STATIC PRESSURE AND DYNAMIC PRESSURE FOR NACA 4412
The static pressure and dynamic pressure are important parameters and have a strong influence on airplane wing lift and stagnation point. In this paper NACA 4412 airfoil profile is considered for analysis of an air...
Implementation and Optimization of 4×4 Luminance Intra Prediction Modes on FPGA
This paper proposes an efficient, fast and parallel processing of 4×4 luminance intra prediction implemented on FPGA. H.264[1] advanced video coding is a present generation video compression algorithm which can achieve h...
An Area Efficient (31, 16) BCH Decoder for Three Errors
Bose, Ray- Chaudhuri, Hocquenghem (BCH) codes are one of the efficient error-correcting codes used to correct errors occurred during the transmission of the data in the unreliable communication mediums. This paper presen...
Structural Analysis of Front axle beam of a Light Commercial Vehicle (LCV)
There has been exhaustive efforts to develop the front axle design by studying the noise and vibration analysis at static and dynamic loading conditions. The model selected is that of a light commercial vehicle (LCV) whi...
Network Monitoring and Analysis by Packet Sniffing Method
Today we are seeing that computer networks are increasing in their sizes very rapidly. Number of its user increased in past few years and traffic flows in networks also increased, so it’s very important to monitor...