Data deduplication techniques for efficient cloud storage management: a systematic review

R Kaur, I Chana, J Bhattacharya - The Journal of Supercomputing, 2018 - Springer
The exponential growth of digital data in cloud storage systems is a critical issue presently
as a large amount of duplicate data in the storage systems exerts an extra load on it …

Perceptual hashing for image authentication: A survey

L Du, ATS Ho, R Cong - Signal Processing: Image Communication, 2020 - Elsevier
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …

Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints

C Qin, E Liu, G Feng, X Zhang - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
In this paper, a novel perceptual image hashing scheme based on convolutional neural
network (CNN) with multiple constraints is proposed, in which our deep hashing network …

A secure and robust hash-based scheme for image authentication

F Ahmed, MY Siyal, VU Abbas - Signal Processing, 2010 - Elsevier
To authenticate an image using a hash function is a challenging task since several core
issues like tamper detection, security and robustness needs to be addressed. In this paper …

A visual model-based perceptual image hash for content authentication

X Wang, K Pang, X Zhou, Y Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Perceptual image hash has been widely investigated in an attempt to solve the problems of
image content authentication and content-based image retrieval. In this paper, we combine …

Effective and efficient image copy detection with resistance to arbitrary rotation

Z Zhou, CN Yang, B Chen, X Sun, Q Liu… - IEICE Transactions on …, 2016 - search.ieice.org
For detecting the image copies of a given original image generated by arbitrary rotation, the
existing image copy detection methods can not simultaneously achieve desirable …

Robust image hash in Radon transform domain for authentication

Y Lei, Y Wang, J Huang - Signal Processing: Image Communication, 2011 - Elsevier
Image authentication has become an emergency issue in the digital world as it can be easily
tampered with the image editing techniques. In this paper, a novel robust hashing method …

A novel image hashing scheme with perceptual robustness using block truncation coding

C Qin, X Chen, D Ye, J Wang, X Sun - Information Sciences, 2016 - Elsevier
In this paper, we propose a novel perceptual image hashing scheme based on block
truncation coding (BTC). In the proposed scheme, the pre-processing is first applied on …

Perceptual hashing for color images based on hybrid extraction of structural features

C Qin, M Sun, CC Chang - Signal processing, 2018 - Elsevier
In this paper, a novel perceptual hashing scheme for color images is proposed with the
hybrid feature extraction mechanism. During the stage of pre-processing, image …

Histogram-based image hashing scheme robust against geometric deformations

S **ang, HJ Kim, J Huang - Proceedings of the 9th Workshop on …, 2007 - dl.acm.org
In this paper, we propose a robust image hash algorithm by using the invariance of the
image histogram shape to geometric deformations. Robustness and uniqueness of the …