Title :
Robust image authentication using hash function
Author :
Kobayashi, Hideo ; Kiya, Hitoshi
Author_Institution :
Dept. of Electr. Eng., Tokyo Metropolitan Coll. of Technol., Japan
Abstract :
We propose an image monitoring scheme for detecting malicious alternation and broadcast monitoring. This method has a property that a desired absolute error is admitted for a monitor image. In other words, the monitor image is recognized as the suitable image within the desired error. The property allows us to monitor the image robustly against lossy codings, transmission errors, and so on. In this method, we generate a reference image from the monitor image, and then calculate a hash value as feature information. Selecting the generation method of the reference image and the desired error can control the monitoring accuracy and the robustness.
Keywords :
cryptography; file organisation; image processing; monitoring; hash functions; image monitoring scheme; robust image authentication; Authentication; Broadcasting; Error correction; Image coding; Image generation; Image recognition; Monitoring; Propagation losses; Robust control; Robustness;
Conference_Titel :
TENCON 2004. 2004 IEEE Region 10 Conference
Print_ISBN :
0-7803-8560-8
DOI :
10.1109/TENCON.2004.1414450