Thursday, 29 August 2019

A Review of Robust Hashing Methods for Content Based Image Authentication

Volume 3 Issue 4 October - December 2016

Survey Paper

A Review of Robust Hashing Methods for Content Based Image Authentication

Lokanadham Naidu Vadlamudi*, Rama Prasad V. Vaddella**, D. Vasumathi***
* Assistant Professor, Department of Information Technology, Sree Vidyanikethan Engineering College, Andhra Pradesh, India.
** Professor, Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Andhra Pradesh, India.
*** Professor, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Telangana, India.
Vadlamudi, L. N., Vaddella, R. P. V., and Devara, V. (2016). A Review Of Robust Hashing Methods For Content Based Image Authentication. i-manager's Journal on Image Processing, 3(4), 38-45.

Abstract
At present, the multimedia data will be transmitted rapidly using an internet. But, whether the data reaches the recipient without tampering is questionable. The current multimedia editing software allows adversaries to alter multimedia data without changing its visual perception. Different categories of approaches exist for verifying the integrity as well as authenticity of multimedia data. The Content Based Authentication (CBA) is one among them. This review paper describes various Content Based Image Authentication (CBIA) methods, which have been developed for integrity verification of images. And also, this paper summarizes various techniques used in existing image authentication methods to extract robust features. In addition, this paper discusses the important characteristics of a CBIA approach, limitations of existing methods and future research directions. The development of robust and secure image authentication method for content authentication is still an open challenge for current researchers.

No comments:

Post a Comment