International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 388

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.7 / 10


     

SMART: Saliency Map, Moments and Texture Features for Robust Image Authentication

Derroll David, Divya B, Pournami


Abstract: Image Authentication is the process of providing proof to a person or system that the images are indeed that claims to be. Image hashing is a technique used for image authentication and is very popular and ensures remarkable results. Global and Local feature extraction is enhanced for generating a hash that is sensitive to image content. Normal manipulations like JPEG coding, rotation, cropping, additive noise, gamma correction and scaling are robust enough so that the image content information can be recognized as authentic even if the image intensity is varied by these operations. The concern regarding content preserved hashing is that the salient regions need to be detected accurately so that local feature extraction can be applied in to the region of interest. A hybrid approach consisting of frequency prior, center prior and location prior along with watershed for segmentation is used for extracting the saliency regions in the image more efficiently with increasing localization capability in less hash length.


Keywords: Image Authentication, Forgery, Hashing, Saliency map, Zernike moment, Texture Features


Edition: Volume 4 Issue 7, July 2015


Pages: 2228 - 2235



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Derroll David, Divya B, Pournami, "SMART: Saliency Map, Moments and Texture Features for Robust Image Authentication", International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 2228-2235, https://www.ijsr.net/getabstract.php?paperid=SUB156962, DOI: https://www.doi.org/10.21275/SUB156962



Similar Articles

Downloads: 95 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 85 - 88

CBCD Methods in Video Copy Detection

Jan Mary Thomas

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1910 - 1915

An Efficient Hash Count Indexing and Searching Scheme for Audio Fingerprinting

Simarjeet Singh Bhatia, Rupali Bhartiya

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2294 - 2297

Disease Inference and Community-based Health Services

Asif Akram, Rekha Jadhav

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 5, May 2017

Pages: 2718 - 2725

Fast Dictionary Construction using Data Structure and Numeration Methodology with Double Hashing

Safa S. Abdul-Jabbar, Loay E. George

Share this Article



Top