Robust image authentication using hash function

被引:0
|
作者
Kobayashi, H [1 ]
Kiya, H [1 ]
机构
[1] Tokyo Metropolitan Coll Technol, Dept Elect Engn, Shinagawa Ku, Tokyo 1400011, Japan
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose an image monitoring scheme for detecting malicious alternation and broadcast monitoring. This method has a property that a desired absolute error is admitted for a monitor image. In other words, the monitor image is recognized as the suitable image within the desired error The property allows us to monitor the image robustly against lossy codings, transmission errors, and so on. In this method, we generate a reference image from the monitor image, then calculate a hash value as feature information. The monitoring accuracy and the robustness can be controlled by selecting the generation method of the reference image and the desired error.
引用
收藏
页码:A435 / A438
页数:4
相关论文
共 50 条
  • [1] Robust image hash in Radon transform domain for authentication
    Lei, Yanqiang
    Wang, Yuangen
    Huang, Jiwu
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (06) : 280 - 288
  • [2] Medical image authentication using hash function and integer wavelet transform
    Piao, Cheng-Ri
    Woo, Dong-Min
    Park, Dong-Chul
    Hank, Seung-Soo
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2008, : 7 - +
  • [3] Robust image hash function using local color features
    Tang, Zhenjun
    Zhang, Xianquan
    Dai, Xuan
    Yang, Jianzhong
    Wu, Tianxiu
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2013, 67 (08) : 717 - 722
  • [4] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    [J]. SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [5] Robust hash generation technique for content-based image authentication using histogram
    Vadlamudi, Lokanadham Naidu
    Vaddella, Rama Prasad V.
    Devara, Vasumathi
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (11) : 6585 - 6604
  • [6] Robust hash generation technique for content-based image authentication using histogram
    Lokanadham Naidu Vadlamudi
    Rama Prasad V. Vaddella
    Vasumathi Devara
    [J]. Multimedia Tools and Applications, 2016, 75 : 6585 - 6604
  • [7] A Robust Image Hash Function based on Color and Texture Features of the Image
    Neelima, Arambam
    Singh, Kh. Manglem
    [J]. 2015 International Symposium on Advanced Computing and Communication (ISACC), 2015, : 238 - 243
  • [8] A robust watermarking approach for medical image authentication using dual image and quorum function
    Dey, Ashis
    Chowdhuri, Partha
    Pal, Pabitra
    Nandi, Utpal
    [J]. Journal of Visual Communication and Image Representation, 2024, 104
  • [9] A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
    Das, Ashok Kumar
    Odelu, Vanga
    Goswami, Adrijit
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [10] Image authentication based on perceptual hash using Gabor filters
    Wang, Lina
    Jiang, Xiaqiu
    Lian, Shiguo
    Hu, Donghui
    Ye, Dengpan
    [J]. SOFT COMPUTING, 2011, 15 (03) : 493 - 504