A Survey on Image Hashing for Image Authentication

Yang OU  Kyung Hyune RHEE  

Publication
IEICE TRANSACTIONS on Information and Systems   Vol.E93-D   No.5   pp.1020-1030
Publication Date: 2010/05/01
Online ISSN: 1745-1361
DOI: 10.1587/transinf.E93.D.1020
Print ISSN: 0916-8532
Type of Manuscript: INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
image hashing,  image authentication,  feature extraction,  perceptibility,  

Full Text: PDF>>
Buy this Article




Summary: 
The traditional cryptographic hash functions are sensitive to even one-bit difference of the input message. While multimedia data always undergo compression or other signal processing operations, which lead to the unsuitability of multimedia authentication using cryptographic hash. The image hashing has emerged recently which captures visual essentials for robust image authentication. In this paper, we give a comprehensive survey of image hashing. We present an overview of various image hashing schemes and discuss their advantages and limitations in terms of security, robustness, and discrimination under different types of operations on the image.