优化的图像哈希技术

S. Sinari, A. Aurora, D. Ruparel, S. Karamchandani
{"title":"优化的图像哈希技术","authors":"S. Sinari, A. Aurora, D. Ruparel, S. Karamchandani","doi":"10.1109/INDIACOM.2014.6828185","DOIUrl":null,"url":null,"abstract":"For the identification and verification of image contents, extremely efficient automated techniques are needed that require digital images to be processed and propagated. Digital data is prone to attacks leaving absolutely no clues about the attacker. Image hashing is the ability to categorize an image irrespective of the change in features like resolution and format as well as corruption. It is used to identify and verify images with similar structural content. We make use of the hash function which purposes to extract a fixed length bit code from a text or image. Hash functions have found varied applications in cryptography, video surveillance in addition to rummage the database. In this review paper, a detailed comparison of three techniques of image hashing is performed which include the Discrete Wavelet Transform, Singular Value Decomposition and a third technique of optimized Feature Extraction. The results of our experimentation reveal optimized values of Feature extraction as the best technique for image hashing.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Optimizied techniques for image hashing\",\"authors\":\"S. Sinari, A. Aurora, D. Ruparel, S. Karamchandani\",\"doi\":\"10.1109/INDIACOM.2014.6828185\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For the identification and verification of image contents, extremely efficient automated techniques are needed that require digital images to be processed and propagated. Digital data is prone to attacks leaving absolutely no clues about the attacker. Image hashing is the ability to categorize an image irrespective of the change in features like resolution and format as well as corruption. It is used to identify and verify images with similar structural content. We make use of the hash function which purposes to extract a fixed length bit code from a text or image. Hash functions have found varied applications in cryptography, video surveillance in addition to rummage the database. In this review paper, a detailed comparison of three techniques of image hashing is performed which include the Discrete Wavelet Transform, Singular Value Decomposition and a third technique of optimized Feature Extraction. The results of our experimentation reveal optimized values of Feature extraction as the best technique for image hashing.\",\"PeriodicalId\":404873,\"journal\":{\"name\":\"2014 International Conference on Computing for Sustainable Global Development (INDIACom)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Computing for Sustainable Global Development (INDIACom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDIACOM.2014.6828185\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIACOM.2014.6828185","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

为了识别和验证图像内容,需要极其高效的自动化技术,这需要对数字图像进行处理和传播。数字数据容易受到攻击,不会留下任何关于攻击者的线索。图像散列是对图像进行分类的能力,而不考虑分辨率、格式和损坏等特征的变化。它用于识别和验证具有相似结构内容的图像。我们使用哈希函数,目的是从文本或图像中提取固定长度的位码。哈希函数在密码学、视频监控以及数据库搜索中都有不同的应用。在这篇综述文章中,详细比较了三种图像哈希技术,包括离散小波变换、奇异值分解和第三种优化特征提取技术。实验结果表明,特征提取的优化值是图像哈希的最佳技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Optimizied techniques for image hashing
For the identification and verification of image contents, extremely efficient automated techniques are needed that require digital images to be processed and propagated. Digital data is prone to attacks leaving absolutely no clues about the attacker. Image hashing is the ability to categorize an image irrespective of the change in features like resolution and format as well as corruption. It is used to identify and verify images with similar structural content. We make use of the hash function which purposes to extract a fixed length bit code from a text or image. Hash functions have found varied applications in cryptography, video surveillance in addition to rummage the database. In this review paper, a detailed comparison of three techniques of image hashing is performed which include the Discrete Wavelet Transform, Singular Value Decomposition and a third technique of optimized Feature Extraction. The results of our experimentation reveal optimized values of Feature extraction as the best technique for image hashing.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信