A Survey on Image Authentication Techniques

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 7, Issue 4

Abstract

Image authentication is the process of proving image identity and authenticity. Digital images are increasingly transmitted over non-secure channels such as the Internet. Military, medical and quality control images must be protected. To protect the authenticity of images, several approaches have been proposed. Nowadays image authentication techniques have recently gained great attention due to its importance of multimedia applications. The traditional cryptographic hash functions, such as MD5 and SHA-1 are used for authentication. However, these hash functions are not suitable for image authentication. Because they are so sensitive that even one bit change of the input data will lead to a significant change of the output hash. Besides, image authentication system requires the main content sensitive. In order to make up for the disadvantage of the traditional cryptographic hash functions in image authentication, robust image hashing was first introduced which provide good ROC performance, low collision probability.

Authors and Affiliations

S. Jothimani , P. Betty

Keywords

Related Articles

 Comparison of Current Modes in CMOS Analog Multipliers

 A study and comparison between current mode CMOS analog multiplier, ±1.5 V High frequency four quadrant current multiplier and ±1.2 V High frequency four quadrant current multiplier has been carried out in this pap...

 Optimization of Geometry of Microfabricated Piezoelectric Actuator

 This paper focuses on optimization of the geometry of piezoelectric actuator for maximization of output for applications such as micro-pump. The device structure consists of a piezoelectric disk/plate which is glue...

 ANN Approach for Weather Prediction using Back Propagation

 Temperature forecasting is important because they are used to protect life and property. Temperature forecasting i s the application of science and technology to predict the state of the temperature for a...

 Comparison of Bending Stresses for Different Face Width of Helical Gear Obtained Using Matlab Simulink with AGMA and ANSYS

 Helical gears are widely used in industry where the power transmission is required at heavy loads with smoother and noiseless operation. The study in this paper shows that the complex design problem of helical gear...

Smart Embedded Medical Diagnosis using Beaglebone Black and Arduino

Now a day’s healthcare industry is to provide better healthcare to people anytime and anywhere in the world in a more economic and patient friendly manner. The Medical Diagnosis Shield allows Arduino and Beaglebone Black...

Download PDF file
  • EP ID EP126461
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

S. Jothimani, P. Betty (2014). A Survey on Image Authentication Techniques. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 7(4), 184-186. https://www.europub.co.uk/articles/-A-126461