A review of hashing based image authentication techniques
Abdul Subhani Shaik,Ram Kumar Karsh,Mohiul Islam,Rabul Hussain Laskar
DOI: https://doi.org/10.1007/s11042-021-11649-7
IF: 2.577
2021-10-29
Multimedia Tools and Applications
Abstract:In the recent digitization era, image hashing is a key technology, including image recognition, authentication and manipulation detection, among many multimedia security applications. The primary challenge in hashing schemes is to extract its robust feature. For a better understanding and design of a robust image hashing algorithm, it is very crucial to look into few important parameters like discrimination, robustness, reliability, etc. This paper reflects a detailed study of the existing literature on hashing-based image authentication techniques. This work provides a systematic overview and highlights the merits and demerits associated with various state-of-the-art techniques. In particular, the basic features and categories of image authentication techniques based on hashing are explored along with their properties. Moreover, different performance measures such as output metrices, receiver operating characteristics (ROC) parameters, execution time, etc., have been discussed in this work. The paper also compares the performances of various existing algorithms related to different content preserving operations on diverse data sets. This paper summarizes all the techniques and provides the most optimum solutions in regard to image hashing techniques based on different parameters.
computer science, information systems, theory & methods,engineering, electrical & electronic, software engineering