Volume : IV, Issue : X, October - 2015
Combining Hashing Techniques in Image Authentication system:A Survey
K. Alice, N. Ramaraj
Abstract :
In content based image authentication system the image hash is generated by extracting image features that holds the content of the image using transform coefficients, Edges, Statistical methods, Local and Global descriptors, Histogram etc. Many authentication systems employ any one of the feature extraction methods to generate an image hash. Recently most authentication system uses a combination of two or more feature extraction methods, to extract the content of image and then to generate an image hash. This is done to fully exploit the advantage of two or more methods over just a single method. In this paper a survey on most recent work in the area of content based image authentication that uses two or more feature extraction techniques and a performance analysis on each of the system based on the requirement of an authentication system is given.
Keywords :
Article:
Download PDF
DOI : 10.36106/ijsr
Cite This Article:
K.Alice, N.Ramaraj Combining Hashing Techniques in Image Authentication system:A Survey International Journal of Scientific Research, Vol : 4, Issue : 10 October 2015
Number of Downloads : 774
References :
K.Alice, N.Ramaraj Combining Hashing Techniques in Image Authentication system:A Survey International Journal of Scientific Research, Vol : 4, Issue : 10 October 2015
Our Other Journals...
-
Indian Journal of
Applied Research Visit Website -
PARIPEX Indian Journal
of Research Visit Website -
Global Journal for
Research Analysis Visit Website