Handbook of Applied Cryptography
Handbook of Applied Cryptography
Second Generation Benchmarking and Application Oriented Evaluation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Compression Tolerant DCT Based Image Hash
ICDCSW '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Histogram-based image hashing scheme robust against geometric deformations
Proceedings of the 9th workshop on Multimedia & security
A study on the randomness measure of image hashing
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A secure and robust hash-based scheme for image authentication
Signal Processing
Fragility analysis of adaptive quantization-based image hashing
IEEE Transactions on Information Forensics and Security
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations
IEEE Transactions on Information Forensics and Security - Part 1
A clustering based approach to perceptual image hashing
IEEE Transactions on Information Forensics and Security
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Rotation-invariant multiresolution texture analysis using Radon and wavelet transforms
IEEE Transactions on Image Processing
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs
IEEE Transactions on Image Processing
Identification of Reflected, Scaled, Translated, and Rotated Objects From Their Radon Projections
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Robust image watermarking based on generalized Radon transformations
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
Image authentication has become an emergency issue in the digital world as it can be easily tampered with the image editing techniques. In this paper, a novel robust hashing method for image authentication is proposed. The reported scheme first performs Radon transform (RT) on the image, and calculates the moment features which are invariant to translation and scaling in the projection space. Then discrete Fourier transform (DFT) is applied on the moment features to resist rotation. Finally, the magnitude of the significant DFT coefficients is normalized and quantized as the image hash bits. Experimental results show that the proposed algorithm can tolerate almost all the typical image processing manipulations, including JPEG compression, geometric distortion, blur, addition of noise, and enhancement. Compared with other approaches in the literature, the reported method is more effective for image authentication in terms of detection performance and the hash size.