Abstract

This paper presents a review of image authentication methods, based on the perceptual image hashing approach. Firstly we analyze two algorithms, which have the capability of determining if an image is authentic or not, even if it has suffered content preserving distortions such as compression, filtering and other signal processing operations; as well as some malicious modification such as geometric distortions. Next two modifications of these algorithms are analyzed which improve their performance by increasing their robustness against geometric distortions providing them also tamper detection capability. Finally two recently proposed algorithms with not only the tamper detection capability, but also with the capability of localizing tampered regions are described. Evaluation results are given to show the performance of these methods under analysis. Key words: Image hashing, tamper detection and localization, image normalization.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.