Volume : IV, Issue : X, October - 2015

Combining Hashing Techniques in Image Authentication system:A Survey

K. Alice, N. Ramaraj

Abstract :

In content based image authentication system the image hash is generated by extracting image features that holds the content of the image using transform coefficients, Edges, Statistical methods, Local and Global descriptors, Histogram etc. Many authentication systems employ any one of the feature extraction methods to generate an image hash. Recently most authentication system uses a combination of two or more feature extraction methods, to extract the content of image and then to generate an image hash. This is done to fully exploit the advantage of two or more methods over just a single method. In this paper a survey on most recent work in the area of content based image authentication that uses two or more feature extraction techniques and a performance analysis on each of the system based on the requirement of an authentication system is given.

Keywords :

Article: Download PDF   DOI : 10.36106/ijsr  

Cite This Article:

K.Alice, N.Ramaraj Combining Hashing Techniques in Image Authentication system:A Survey International Journal of Scientific Research, Vol : 4, Issue : 10 October 2015


Number of Downloads : 774


References :