A comprehensive survey on image authentication for tamper detection with localization

HR Chennamma, B Madhushree - Multimedia Tools and Applications, 2023 - Springer
The data that is stored or transmitted in digital form is susceptible to be attacked. Digital
images are particularly vulnerable to unauthorized access and illicit alterations. As a result …

RETRACTED ARTICLE: A review of hashing based image authentication techniques

AS Shaik, RK Karsh, M Islam, RH Laskar - Multimedia Tools and …, 2022 - Springer
In the recent digitization era, image hashing is a key technology, including image
recognition, authentication and manipulation detection, among many multimedia security …

Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints

C Qin, E Liu, G Feng, X Zhang - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
In this paper, a novel perceptual image hashing scheme based on convolutional neural
network (CNN) with multiple constraints is proposed, in which our deep hashing network …

Robust image hashing for content identification through contrastive self-supervised learning

J Fonseca-Bustos, KA Ramírez-Gutiérrez… - Neural Networks, 2022 - Elsevier
Content identification systems are an essential technology for many applications. These
systems identify query multimedia items using a database of known identities. A hash-based …

Hades: Hash-based audio copy detection system for copyright protection in decentralized music sharing

MRR Ansori, RN Alief, IS Igboanusi… - … on Network and …, 2023 - ieeexplore.ieee.org
Preventive measures to stop copyright infringement are yet to be implemented on current
decentralized music-sharing platforms. There is no mechanism to reject modified audio …

A Secure and Robust Autoencoder‐Based Perceptual Image Hashing for Image Authentication

AS Shaik, RK Karsh, M Islam… - … and Mobile Computing, 2022 - Wiley Online Library
With the advancement of technology, it has become easier to modify or tamper with digital
data effortlessly. In recent times, the image hashing algorithm has gained popularity for …

A reversible watermarking for image content authentication based on wavelet transform

D Li, X Dai, J Gui, J Liu, X ** - Signal, Image and Video Processing, 2024 - Springer
In the special field of anti-counterfeit authentication, such as medical archive protection,
there is a problem of copyright infringement. To protect the privacy contents and achieve …

Perceptual hashing scheme using KAZE feature descriptors for combinatorial manipulations

M Roy, DM Thounaojam, S Pal - Multimedia Tools and Applications, 2022 - Springer
Perceptual image hashing methods utilize the visual phenomenon of the images and
produce a fixed-length hash function and this hash value can be utilized for digital signature …

Perceptual authentication hashing for digital images based on multi-domain feature fusion

F Cao, S Yao, Y Zhou, H Yao, C Qin - Signal Processing, 2024 - Elsevier
In recent decades, numerous perceptual authentication hashing schemes have been
proposed for image content authentication. However, most of these schemes are based on a …

Image perceptual hashing for content authentication based on Watson's visual model and LLE

H **ng, H Che, Q Wu, H Wang - Journal of Real-Time Image Processing, 2023 - Springer
Image perceptual hashing has been widely used in image content authentication. In order to
extract hashing sequences that are more consistent with the subjective feeling of human's …