S. Sinari, A. Aurora, D. Ruparel, S. Karamchandani
{"title":"优化的图像哈希技术","authors":"S. Sinari, A. Aurora, D. Ruparel, S. Karamchandani","doi":"10.1109/INDIACOM.2014.6828185","DOIUrl":null,"url":null,"abstract":"For the identification and verification of image contents, extremely efficient automated techniques are needed that require digital images to be processed and propagated. Digital data is prone to attacks leaving absolutely no clues about the attacker. Image hashing is the ability to categorize an image irrespective of the change in features like resolution and format as well as corruption. It is used to identify and verify images with similar structural content. We make use of the hash function which purposes to extract a fixed length bit code from a text or image. Hash functions have found varied applications in cryptography, video surveillance in addition to rummage the database. In this review paper, a detailed comparison of three techniques of image hashing is performed which include the Discrete Wavelet Transform, Singular Value Decomposition and a third technique of optimized Feature Extraction. The results of our experimentation reveal optimized values of Feature extraction as the best technique for image hashing.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Optimizied techniques for image hashing\",\"authors\":\"S. Sinari, A. Aurora, D. Ruparel, S. Karamchandani\",\"doi\":\"10.1109/INDIACOM.2014.6828185\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For the identification and verification of image contents, extremely efficient automated techniques are needed that require digital images to be processed and propagated. Digital data is prone to attacks leaving absolutely no clues about the attacker. Image hashing is the ability to categorize an image irrespective of the change in features like resolution and format as well as corruption. It is used to identify and verify images with similar structural content. We make use of the hash function which purposes to extract a fixed length bit code from a text or image. Hash functions have found varied applications in cryptography, video surveillance in addition to rummage the database. In this review paper, a detailed comparison of three techniques of image hashing is performed which include the Discrete Wavelet Transform, Singular Value Decomposition and a third technique of optimized Feature Extraction. The results of our experimentation reveal optimized values of Feature extraction as the best technique for image hashing.\",\"PeriodicalId\":404873,\"journal\":{\"name\":\"2014 International Conference on Computing for Sustainable Global Development (INDIACom)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Computing for Sustainable Global Development (INDIACom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDIACOM.2014.6828185\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIACOM.2014.6828185","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
For the identification and verification of image contents, extremely efficient automated techniques are needed that require digital images to be processed and propagated. Digital data is prone to attacks leaving absolutely no clues about the attacker. Image hashing is the ability to categorize an image irrespective of the change in features like resolution and format as well as corruption. It is used to identify and verify images with similar structural content. We make use of the hash function which purposes to extract a fixed length bit code from a text or image. Hash functions have found varied applications in cryptography, video surveillance in addition to rummage the database. In this review paper, a detailed comparison of three techniques of image hashing is performed which include the Discrete Wavelet Transform, Singular Value Decomposition and a third technique of optimized Feature Extraction. The results of our experimentation reveal optimized values of Feature extraction as the best technique for image hashing.