首页 | 本学科首页   官方微博 | 高级检索  
     


Perceptual hashing for image authentication: A survey
Affiliation:1. Southwestern University of Finance and Economics, Chengdu, China;2. Department of Real Estate, Konkuk University, Seoul, Republic of Korea;1. Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, BC, V6T 1Z4, Canada;2. Microsoft Research AI, Redmond, WA, USA;3. Shenzhen Key Laboratory of Broadband Network & Multimedia, Graduate School at Shenzhen, Tsinghua University, Shenzhen 518055, China;1. Laboratory of Image Science and Technology, Southeast University, Key Laboratory of Computer Network and Information Integration (Southeast University), Ministry of Education, 210096, Nanjing, China;2. Institut Mines-Telecom, Telecom Bretagne, INSERM U1101 Latim, Brest, F-29238, France;3. Centre de Recherche en Information Médicale Sino-français (CRIBs), Rennes, F-35000, France;4. Hunan University of Science and Technology, 411201, Xiangtan, China
Abstract:Perceptual hashing is used for multimedia content identification and authentication through perception digests based on the understanding of multimedia content. This paper presents a literature review of image hashing for image authentication in the last decade. The objective of this paper is to provide a comprehensive survey and to highlight the pros and cons of existing state-of-the-art techniques. In this article, the general structure and classifications of image hashing based tamper detection techniques with their properties are exploited. Furthermore, the evaluation datasets and different performance metrics are also discussed. The paper concludes with recommendations and good practices drawn from the reviewed techniques.
Keywords:Tamper detection  Perceptual image hashing  Content authenticity analysis  Security
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号