The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
As funções hash criptográficas tradicionais são sensíveis até mesmo à diferença de um bit da mensagem de entrada. Enquanto os dados multimídia sempre passam por compressão ou outras operações de processamento de sinal, o que leva à inadequação da autenticação multimídia usando hash criptográfico. O hashing de imagem surgiu recentemente e captura elementos visuais essenciais para uma autenticação robusta de imagem. Neste artigo, oferecemos uma pesquisa abrangente sobre hashing de imagens. Apresentamos uma visão geral de vários esquemas de hashing de imagens e discutimos suas vantagens e limitações em termos de segurança, robustez e discriminação sob diferentes tipos de operações na imagem.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Yang OU, Kyung Hyune RHEE, "A Survey on Image Hashing for Image Authentication" in IEICE TRANSACTIONS on Information,
vol. E93-D, no. 5, pp. 1020-1030, May 2010, doi: 10.1587/transinf.E93.D.1020.
Abstract: The traditional cryptographic hash functions are sensitive to even one-bit difference of the input message. While multimedia data always undergo compression or other signal processing operations, which lead to the unsuitability of multimedia authentication using cryptographic hash. The image hashing has emerged recently which captures visual essentials for robust image authentication. In this paper, we give a comprehensive survey of image hashing. We present an overview of various image hashing schemes and discuss their advantages and limitations in terms of security, robustness, and discrimination under different types of operations on the image.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E93.D.1020/_p
Copiar
@ARTICLE{e93-d_5_1020,
author={Yang OU, Kyung Hyune RHEE, },
journal={IEICE TRANSACTIONS on Information},
title={A Survey on Image Hashing for Image Authentication},
year={2010},
volume={E93-D},
number={5},
pages={1020-1030},
abstract={The traditional cryptographic hash functions are sensitive to even one-bit difference of the input message. While multimedia data always undergo compression or other signal processing operations, which lead to the unsuitability of multimedia authentication using cryptographic hash. The image hashing has emerged recently which captures visual essentials for robust image authentication. In this paper, we give a comprehensive survey of image hashing. We present an overview of various image hashing schemes and discuss their advantages and limitations in terms of security, robustness, and discrimination under different types of operations on the image.},
keywords={},
doi={10.1587/transinf.E93.D.1020},
ISSN={1745-1361},
month={May},}
Copiar
TY - JOUR
TI - A Survey on Image Hashing for Image Authentication
T2 - IEICE TRANSACTIONS on Information
SP - 1020
EP - 1030
AU - Yang OU
AU - Kyung Hyune RHEE
PY - 2010
DO - 10.1587/transinf.E93.D.1020
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E93-D
IS - 5
JA - IEICE TRANSACTIONS on Information
Y1 - May 2010
AB - The traditional cryptographic hash functions are sensitive to even one-bit difference of the input message. While multimedia data always undergo compression or other signal processing operations, which lead to the unsuitability of multimedia authentication using cryptographic hash. The image hashing has emerged recently which captures visual essentials for robust image authentication. In this paper, we give a comprehensive survey of image hashing. We present an overview of various image hashing schemes and discuss their advantages and limitations in terms of security, robustness, and discrimination under different types of operations on the image.
ER -