A secured distributed detection system based on IPFS and blockchain for industrial image and video data security

R Kumar, R Tripathi, N Marchang, G Srivastava… - Journal of Parallel and …, 2021 - Elsevier
Copyright infringement adversely affects the interest of copyright holders of images and
videos which are uploaded to different websites and peer-to-peer image sharing systems …

Perceptual hashing for image authentication: A survey

L Du, ATS Ho, R Cong - Signal Processing: Image Communication, 2020 - Elsevier
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …

RETRACTED ARTICLE: A review of hashing based image authentication techniques

AS Shaik, RK Karsh, M Islam, RH Laskar - Multimedia Tools and …, 2022 - Springer
In the recent digitization era, image hashing is a key technology, including image
recognition, authentication and manipulation detection, among many multimedia security …

Robust image hashing with tensor decomposition

Z Tang, L Chen, X Zhang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper presents a new image hashing that is designed with tensor decomposition (TD),
referred to as TD hashing, where image hash generation is viewed as deriving a compact …

An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer

C Qin, X Qian, W Hong, X Zhang - Information Sciences, 2019 - Elsevier
Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive
attention, which can be used in secure cloud computing and privacy protection effectively. In …

Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints

C Qin, E Liu, G Feng, X Zhang - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
In this paper, a novel perceptual image hashing scheme based on convolutional neural
network (CNN) with multiple constraints is proposed, in which our deep hashing network …

Efficient hashing method using 2D-2D PCA for image copy detection

X Liang, Z Tang, Z Huang, X Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Image copy detection is an important technology of copyright protection. This paper
proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …

Fractal coding-based robust and alignment-free fingerprint image hashing

SM Abdullahi, H Wang, T Li - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Biometric image hashing techniques have been widely studied and seen progressive
advancements. However, only a handful of available solutions provide two-factor …

Reversible data hiding in encrypted image with separable capability and high embedding capacity

C Qin, Z He, X Luo, J Dong - Information Sciences, 2018 - Elsevier
In this paper, a high-capacity reversible data hiding scheme in encrypted image with
separable capability is proposed. In order to mask image contents, original image is first …

Unified performance evaluation method for perceptual image hashing

X Li, C Qin, Z Wang, Z Qian… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In recent decades, a large number of perceptual image hashing schemes have been
designed to secure the authenticity and integrity of digital images. However, the feasible …