A Survey on Image Authentication Techniques
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2014 by IJETT Journal|
|Year of Publication : 2014|
|Authors : S.Jothimani , P.Betty
S.Jothimani , P.Betty , Article : A Survey on Image Authentication Techniques, International Journal of Engineering Trends and Technology(IJETT), 7(4),184-186, published by seventh sense research group
Image authentication is the process of proving image identity and authenticity. Digital images are increasingly transmitted over non-secure channels such as the Internet. Military, medical and quality control images must be protected. To protect the authenticity of images, several approaches have been proposed. Nowadays image authentication techniques have recently gained great attention due to its importance of multimedia applications. The traditional cryptographic hash functions, such as MD5 and SHA-1 are used for authentication. However, these hash functions are not suitable for image authentication. Because they are so sensitive that even one bit change of the input data will lead to a significant change of the output hash. Besides, image authentication system requires the main content sensitive. In order to make up for the disadvantage of the traditional cryptographic hash functions in image authentication, robust image hashing was first introduced which provide good ROC performance, low collision probability.
 Yan Zhao, Shuozhong Wang, Guorui Feng, Zhenjun Tang, ”A Robust Image Hashing Method Based on Zernike Moments”,IEEE Journal of Computational Information Systems6:3 717-725,2011.
 Yan Zhao, Shuozhong Wang, Xinpeng Zhang, and Heng Yao, Member, IEEE“Robust Hashing For Image Authentication Using Zernike Moments And Local Features” IEEE Transactions On Information Forensics And Security, Vol.8, No. 1, January 2013.
 Y. Lei, Y.Wang, and J. Huang, “Robust image hash in Radom transform domain for authentication,” IEEE Signal Process.Image Communication.vol.26, no.6, pp.280288, 2011.
 V.Monga, M.K.Mihcak, “Robust and secure Image hashing via non-negative matrix factorizations,” IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp.376– 390, Sep.2007.
Authentication, Zernike moments, NMF, Random transform.