{"title":"On the use of hash functions for defect detection in textures for in-camera web inspection systems","authors":"I. C. Baykal, R. Muscedere, G. Jullien","doi":"10.1109/ISCAS.2002.1010791","DOIUrl":null,"url":null,"abstract":"Hash functions are one way functions which are used in cryptography to ensure integrity of files by creating a binary signature specific to that file. A family of special hash functions are developed, which are simple enough to fit into a small FPGA and can generate one dimensional signatures of repeating texture images. While these hash functions are sensitive enough to detect small changes and defects in texture, they are immune to change in illumination and contrast. Analyses of these signatures and determination of the parameters of the hash functions are presented.","PeriodicalId":203750,"journal":{"name":"2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCAS.2002.1010791","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23
Abstract
Hash functions are one way functions which are used in cryptography to ensure integrity of files by creating a binary signature specific to that file. A family of special hash functions are developed, which are simple enough to fit into a small FPGA and can generate one dimensional signatures of repeating texture images. While these hash functions are sensitive enough to detect small changes and defects in texture, they are immune to change in illumination and contrast. Analyses of these signatures and determination of the parameters of the hash functions are presented.