Grayscale Image Authentication using Neural Hashing

نویسندگان

  • Yakup Kutlu
  • Apdullah Yayik
چکیده

Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication. The suggested system is rapid, robust, useful and secure. Proposed hash function generates hash values using neural network one-way property and non-linear techniques. As a result security and performance analysis are performed and satisfying results are achieved. These features are dominant reasons for preferring against traditional ones.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

Compressed Image Hashing using Minimum Magnitude CSLBP

Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...

متن کامل

Authentication of Grayscale Images and Data Repairing Using Secret Sharing Method

Digital images are used to safeguard confidential & important information. But the problem is providing authentication, integrity and data security to these digital images. In existing techniques of security and authentication conventional watermarking schemes are used. In these techniques cryptography is the basic method adopted which has problem of tampering of information easily by hackers. ...

متن کامل

Human Identification Based on Sclera Vein Recognition Using Histogram of Oriented Gradient

Sclera vein recognition is an evolving technology for the pattern recognition system that recognize a person for authentication .sclera vein recognition presents a challenging problem in the field of image analysis and computer vision, and as such has received a great deal of attention over the last few years because of its many applications in various domains. This paper has several contributi...

متن کامل

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

In this paper we present a watermarking algorithm for image content authentication with localization and recovery capability of the modified areas. We use a halftone image generated by the Floyd-Steinberg kernel as an approximate version of the host image. We adopt this halftone image as a watermark sequence and embed it using the quantization watermarking method into the sub-band LL of the Int...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1703.00726  شماره 

صفحات  -

تاریخ انتشار 2016