Login / Signup
A review of hashing based image authentication techniques.
Abdul Subhani Shaik
Ram Kumar Karsh
Mohiul Islam
Rabul Hussain Laskar
Published in:
Multim. Tools Appl. (2022)
Keyphrases
</>
image authentication
public key
semi fragile watermarking
watermarking scheme
jpeg compression
copyright protection
digital watermarking
authentication scheme
watermarking algorithm
motion estimation
similarity search
image content
hash functions