Skip to main content
Log in

A review of hashing based image authentication techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the recent digitization era, image hashing is a key technology, including image recognition, authentication and manipulation detection, among many multimedia security applications. The primary challenge in hashing schemes is to extract its robust feature. For a better understanding and design of a robust image hashing algorithm, it is very crucial to look into few important parameters like discrimination, robustness, reliability, etc. This paper reflects a detailed study of the existing literature on hashing-based image authentication techniques. This work provides a systematic overview and highlights the merits and demerits associated with various state-of-the-art techniques. In particular, the basic features and categories of image authentication techniques based on hashing are explored along with their properties. Moreover, different performance measures such as output metrices, receiver operating characteristics (ROC) parameters, execution time, etc., have been discussed in this work. The paper also compares the performances of various existing algorithms related to different content preserving operations on diverse data sets. This paper summarizes all the techniques and provides the most optimum solutions in regard to image hashing techniques based on different parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Abdullahi SM, Wang H, Li T (2020) Fractal coding-based robust and alignment-free fingerprint image hashing. IEEE Trans Inf Forensics Secur 15:2587–2601. https://doi.org/10.1109/TIFS.2020.2971142

    Article  Google Scholar 

  2. Ahmed F, Siyal MY, Uddin V (2010) A secure and robust hash-based scheme for image authentication. Signal Process 90(5):1456–1470. https://doi.org/10.1016/j.sigpro.2009.05.024

    Article  MATH  Google Scholar 

  3. Ali NHM, Mahdi ME (2020) Detecting similarity in color images based on perceptual image hash algorithm. IOP Conf Ser Mater Sci Eng. https://doi.org/10.1088/1757-899X/737/1/012244

    Article  Google Scholar 

  4. Biswas R, González-castro V, Fidalgo E, Alegre E (2019) Perceptual image hashing based on frequency dominant neighborhood structure applied to Tor domains recognition. Neurocomputing. https://doi.org/10.1016/j.neucom.2019.11.065

    Article  Google Scholar 

  5. Chen Y, Yu W, Feng J (2014) Robust image hashing using invariants of Tchebichef moments. Optik (Stuttg) 125(19):5582–5587. https://doi.org/10.1016/j.ijleo.2014.07.006

    Article  Google Scholar 

  6. Choi YS, Park JH (2012) Image hash generation method using hierarchical histogram. Multimed Tools Appl 61(1):181–194. https://doi.org/10.1007/s11042-010-0724-7

    Article  Google Scholar 

  7. U. K. Das and S. G. Samaddar (2018) Digital forensic enabled image authentication using least signi fi cant Bit (LSB) with Tamper Localization Based Hash Function. pp. 141–155.

  8. Davarzani R, Mozaffari S, Yaghmaie K (2016) Perceptual image hashing using center-symmetric local binary patterns. Multimed Tools Appl 75(8):4639–4667. https://doi.org/10.1007/s11042-015-2496-6

    Article  Google Scholar 

  9. De Roover C, De Vleeschouwer C, Lefèbvre F, Macq B (2005) Robust video hashing based on radial projections of key frames. IEEE Trans Signal Process 53(10):4020–4037. https://doi.org/10.1109/TSP.2005.855414

    Article  MathSciNet  MATH  Google Scholar 

  10. Ding K, Chen S, Meng F (2018) A novel perceptual hash algorithm for multispectral image authentication. Algorithms. https://doi.org/10.3390/a11010006

    Article  MATH  Google Scholar 

  11. Du L, Chen Z, Ho ATS (2020) Binary multi-view perceptual hashing for image authentication. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08736-6

    Article  Google Scholar 

  12. Ge L-W, Zhang J, Xia Yi, Chen P, Wang B, Zheng C-H (2019) Deep spatial attention hashing network for image retrieval. J Vis Commun Image Represent 63:102577. https://doi.org/10.1016/j.jvcir.2019.102577

    Article  Google Scholar 

  13. Gharde ND, Thounaojam DM, Soni B, Biswas SK (2018) Robust perceptual image hashing using fuzzy color histogram. Multimed Tools Appl 77(23):30815–30840. https://doi.org/10.1007/s11042-018-6115-1

    Article  Google Scholar 

  14. Ghouti L (2018) Robust perceptual color image hashing using randomized hypercomplex matrix factorization. Multimed. Tools Appl 77(15):19895–19929. https://doi.org/10.1007/s11042-017-5355-9

    Article  Google Scholar 

  15. Hadmi A, Puech W, Said BAE, Ait A (2012) Perceptual image hashing. Watermarking 2(1):68–79

    Google Scholar 

  16. Hamid H, Ahmed F, Ahmad J (2020) Robust image hashing scheme using laplacian pyramids. Comput Electr Eng 84:106648. https://doi.org/10.1016/j.compeleceng.2020.106648

    Article  Google Scholar 

  17. Hosny KM, Khedr YM, Khedr WI, Mohamed ER (2018) Robust color image hashing using quaternion polar complex exponential transform for image authentication. Circuits Syst Signal Process 37(12):5441–5462. https://doi.org/10.1007/s00034-018-0822-8

    Article  Google Scholar 

  18. Huang Z, Liu S (2018) Robustness and discrimination oriented hashing combining texture and invariant vector distance. MM 2018 - Proc. 2018 ACM Multimed Conf 3:1389–1397. https://doi.org/10.1145/3240508.3240690

    Article  Google Scholar 

  19. Huang Z, Liu S (2020) Perceptual image hashing with texture and invariant vector distance for copy detection. IEEE Trans Multimed 9210:1–1. https://doi.org/10.1109/tmm.2020.2999188

    Article  Google Scholar 

  20. Jin L, Li K, Li Z, Xiao F, Qi G-J, Tang J (2018) Deep semantic-preserving ordinal hashing for cross-modal similarity search. IEEE Trans. Neural Networks Learn. Syst., vol., pp. 1–12, doi: https://doi.org/10.1109/TNNLS.2018.2869601.

  21. Jin L, Li Z, Pan Y, Tang J (2020) Weakly-supervised image hashing through masked visual-semantic graph-based reasoning. Conference on multimedia (MM ’20), October 12–16, 2020, Seattle, WA, USA. ACM, New York, NY, USA, 9 pages. pp. 916–924, doi. org/https://doi.org/10.1145/3394171.3414022.

  22. Karsh RK, Laskar RH, Richhariya BB (2016) Robust image hashing using ring partition-PGNMF and local features. Springerplus. https://doi.org/10.1186/s40064-016-3639-6

    Article  Google Scholar 

  23. Karsh RK, Laskar RH, Aditi, (2017) Robust image hashing through DWT-SVD and spectral residual method. Eurasip J Image Video Process. https://doi.org/10.1186/s13640-017-0179-0

    Article  Google Scholar 

  24. Karsh RK, Saikia A, Laskar RH (2018) Image authentication based on robust image hashing with geometric correction. Multimed Tools Appl 77(19):25409–25429. https://doi.org/10.1007/s11042-018-5799-6

    Article  Google Scholar 

  25. Kekre HB, Mishra, D, Halarnkar PN, Shende P, Gupta S (2013) Digital image forgery detection using Image hashing, in 2013 International Conference on Advances in Technology and Engineering, ICATE 2013, pp. 1–6, doi: https://doi.org/10.1109/ICAdTE.2013.6524736..

  26. Khelaifi F, He HJ (2020) Perceptual image hashing based on structural fractal features of image coding and ring partition. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08619-w

    Article  Google Scholar 

  27. Khelifi F, Jiang J (2010) Perceptual image hashing based on virtual watermark detection. IEEE Trans Image Process 19(4):981–994. https://doi.org/10.1109/TIP.2009.2038637

    Article  MathSciNet  MATH  Google Scholar 

  28. Lei Y, Wang Y, Huang J (2011) Signal Processing : Image Communication Robust image hash in Radon transform domain for authentication. Signal Process Image Commun 26(6):280–288. https://doi.org/10.1016/j.image.2011.04.007

    Article  Google Scholar 

  29. Li Y, Lu Z, Zhu C, Niu X (2012) Robust image hashing based on random gabor filtering and dithered lattice vector quantization. IEEE Trans Image Process 21(4):1963–1980. https://doi.org/10.1109/TIP.2011.2171698

    Article  MathSciNet  MATH  Google Scholar 

  30. Li Z, Tang J, Member S (2015) Weakly supervised deep metric learning for community-contributed image retrieval. IEEE Trans Multimedia 17(11):1989–1999

    Article  Google Scholar 

  31. Li Z, Tang J, Zhang L, Yang J (2020) Weakly-supervised semantic guided hashing for social image retrieval. Int J Comput Vision. https://doi.org/10.1007/s11263-020-01331-0

    Article  MathSciNet  Google Scholar 

  32. Lu H, Zhang M, Xu X, Li Y, Shen HT (2020) Deep fuzzy hashing network for efficient image retrieval. IEEE Trans Fuzzy Syst. https://doi.org/10.1109/TFUZZ.2020.2984991

    Article  Google Scholar 

  33. X. Lv and Z. J. Wang (2009) An extended image hashing concept: content-based fingerprinting using FJLT. vol. 2009, doi: https://doi.org/10.1155/2009/859859.

  34. Lv X, Jane Wang Z (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7(3):1081–1093. https://doi.org/10.1109/TIFS.2012.2190594

    Article  Google Scholar 

  35. Ma Q, Xu L, Xing L, Wu B (2018) Robust image authentication via locality sensitive hashing with core alignment. Multimed Tools Appl 77(6):7131–7152. https://doi.org/10.1007/s11042-017-4625-x

    Article  Google Scholar 

  36. Monga V, Evans BL (2006) Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Process 15(11):3452–3465. https://doi.org/10.1109/TIP.2006.881948

    Article  Google Scholar 

  37. Monga V, Mıhçak MK (2007) Robust and Secure Image Hashing via Non-Negative Matrix Factorizations. IEEE Trans Inf Forensics Secur 2(3):376–390

    Article  Google Scholar 

  38. Ng WWY, Li J, Tian X, Wang H, Kwong S, Wallace J (2020) Multi-level supervised hashing with deep features for efficient image retrieval. Neurocomputing 399:171–182. https://doi.org/10.1016/j.neucom.2020.02.046

    Article  Google Scholar 

  39. Ouyang J, Coatrieux G, Shu H (2015) Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform. Digit Signal Process A 41:98–109. https://doi.org/10.1016/j.dsp.2015.03.006

    Article  Google Scholar 

  40. Patil V (2019) Image hashing using DWT-CSLBP. J Comput 14(3):210–222. https://doi.org/10.17706/jcp.14.3.210-222

    Article  Google Scholar 

  41. Paul M, Thakuria A, Karsh RK, Talukdar FA (2021) Robust color image hashing using convolutional stacked de-noising auto-encoders for image authentication. Neural Comput Appl. https://doi.org/10.1007/s00521-021-05956-1

    Article  Google Scholar 

  42. Peng Z, Li Z, Zhang J, Li Y, Qi G-J, Tang Z (2019) Few-shot image recognition with knowledge transfer. pp. 441–449.

  43. Pun CM, Yan CP, Yuan XC (2018) Robust image hashing using progressive feature selection for tampering detection. Multimed Tools Appl 77(10):11609–11633. https://doi.org/10.1007/s11042-017-4809-4

    Article  Google Scholar 

  44. Qin C, Chen X, Dong J, Zhang X (2016) Perceptual image hashing with selective sampling for salient structure features. Displays 45:26–37. https://doi.org/10.1016/j.displa.2016.09.003

    Article  Google Scholar 

  45. Qin C, Chen X, Ye D, Wang J, Sun X (2016) A novel image hashing scheme with perceptual robustness using block truncation coding. Inf Sci (Ny) 361–362:84–99. https://doi.org/10.1016/j.ins.2016.04.036

    Article  Google Scholar 

  46. Qin C, Chen X, Luo X, Zhang X, Sun X (2018) Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inform Sci 423:284–302. https://doi.org/10.1016/j.ins.2017.09.060

    Article  MathSciNet  Google Scholar 

  47. Qin C, Sun M, Chang CC (2018) Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process 142:194–205. https://doi.org/10.1016/j.sigpro.2017.07.019

    Article  Google Scholar 

  48. Qin C, Hu Y, Yao H, Duan X, Gao L (2019) Perceptual image hashing based on weber local binary pattern and color angle representation. IEEE Access 7(1):45460–45471. https://doi.org/10.1109/ACCESS.2019.2908029

    Article  Google Scholar 

  49. Sebastian LS, Varghese A, Manesh T (2015) Image authentication by content preserving robust image hashing using local and global features. Procedia 46:1554–1560. https://doi.org/10.1016/j.procs.2015.02.081

    Article  Google Scholar 

  50. Shen Q, Y Zhao (2019) Image hashing based on CS-LBP and DCT for copy detection. In Artificial intelligence and security. Springer International Publishing

  51. Shen Q, Zhao Y (2020) Perceptual hashing for color image based on color opponent component and quadtree structure. Signal Process 166:107244. https://doi.org/10.1016/j.sigpro.2019.107244

    Article  Google Scholar 

  52. Sun R, Zeng W (2014) Secure and robust image hashing via compressive sensing. Multimed Tools Appl 70(3):1651–1665. https://doi.org/10.1007/s11042-012-1188-8

    Article  Google Scholar 

  53. Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 1(2):215–230. https://doi.org/10.1109/TIFS.2006.873601

    Article  Google Scholar 

  54. Tang Z, Wang S, Zhang X, Wei W (2011) Structural feature-based image hashing and similarity metric for tampering detection. Fundam Inform 106(1):75–91. https://doi.org/10.3233/FI-2011-377

    Article  MathSciNet  Google Scholar 

  55. Tang Z, Wang S, Zhang X, Wei W, Zhao Y (2011) Lexicographical framework for image hashing with implementation based on DCT and NMF. Multimed Tools Appl 52(2–3):325–345. https://doi.org/10.1007/s11042-009-0437-y

    Article  Google Scholar 

  56. Tang Z, Dai Y, Zhang X, Zhang S (2012) Perceptual image hashing with histogram of color vector angles. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 7669 LNCS, pp. 237–246, doi: https://doi.org/10.1007/978-3-642-35236-2_24.

  57. Tang Z, Huang L, Dai Y, Yang F (2012) Robust image hashing based on multiple histograms. Int J Digit Content Technol Its Appl 6(23):39–47

    Google Scholar 

  58. Tang Z, Yang F, Huang L, Wei M (2013) DCT and DWT based image hashing for copy detection. ICIC Express Lett 7(11):2961–2967

    Google Scholar 

  59. Tang Z, Zhang X, Huang L, Dai Y (2013) Robust image hashing using ring-based entropies. Signal Process 93(7):2061–2069. https://doi.org/10.1016/j.sigpro.2013.01.008

    Article  Google Scholar 

  60. Tang Z, Zhang X, Zhang S, Member S (2014) Robust perceptual image hashing based on ring partition and NMF. IEEE Trans Knowl Data Eng 26(3):711–724

    Article  Google Scholar 

  61. Tang Z, Dai Y, Zhang X, Huang L, Yang F (2014) Robust image hashing via colour vector angles and discrete wavelet transform. IET Image Process 8(3):142–149. https://doi.org/10.1049/iet-ipr.2013.0332

    Article  Google Scholar 

  62. Tang Z, Yang F, Huang L, Zhang X (2014) Robust image hashing with dominant DCT coefficients. Optik (Stuttg) 125(18):5102–5107. https://doi.org/10.1016/j.ijleo.2014.05.015

    Article  Google Scholar 

  63. Tang Z, Ruan L, Qin C, Zhang X, Yu C (2015) Robust image hashing with embedding vector variance of LLE. Digit Signal Process A 43:17–27. https://doi.org/10.1016/j.dsp.2015.05.002

    Article  Google Scholar 

  64. Tang Z, Zhang X, Li X, Zhang S (2016) Robust image hashing with ring partition and invariant vector distance. IEEE Trans Inf Forensics Secur 11(1):200–214. https://doi.org/10.1109/TIFS.2015.2485163

    Article  Google Scholar 

  65. Tang Z, Lao H, Zhang X, Liu K (2016) Robust image hashing via DCT and LLE. Comput Secur 62:133–148. https://doi.org/10.1016/j.cose.2016.07.006

    Article  Google Scholar 

  66. Tang Z, Huang L, Zhang X, Lao H (2016) International Journal of Electronics and Communications ( AEÜ) Robust image hashing based on color vector angle and Canny operator. AEUE - Int J Electron Commun 70(6):833–841. https://doi.org/10.1016/j.aeue.2016.03.010

    Article  Google Scholar 

  67. Tang Z, Huang Z, Zhang X, Lao H (2017) Robust image hashing with multidimensional scaling. Signal Process 137:240–250. https://doi.org/10.1016/j.sigpro.2017.02.008

    Article  Google Scholar 

  68. Tang J, S. Member, and Z. Li (2017) Weakly-supervised multimodal hashing for scalable social image retrieval. In: IEEE Transactions on Circuits and Systems for Video Technology, pp. 1–12, doi: https://doi.org/10.1109/TCSVT.2017.2715227.

  69. Tang Z, Li X, Zhang X, Zhang S, Dai Y (2018) Image hashing with color vector angle. Neurocomputing 308(147–158):2018. https://doi.org/10.1016/j.neucom.2018.04.057

    Article  Google Scholar 

  70. Tang Z, Chen L, Zhang X, Zhang S (2019) Robust image hashing with tensor decomposition. IEEE Trans Knowl Data Eng 31(3):549–560. https://doi.org/10.1109/TKDE.2018.2837745

    Article  Google Scholar 

  71. Tang Z, Zhang H, Lu S, Yao H, Zhang X (2020) Robust image hashing with compressed sensing and ordinal measures. Eurasip J Image Video Process. https://doi.org/10.1186/s13640-020-00509-3

    Article  Google Scholar 

  72. Tao F, Qian W (2019) Image hash authentication algorithm for orthogonal moments of fractional order chaotic scrambling coupling hyper-complex number. Meas J Int Meas Confed 134:866–873. https://doi.org/10.1016/j.measurement.2018.11.079

    Article  Google Scholar 

  73. Tian X, Ng WWY, Wang H, Kwong S (2020) Complementary incremental hashing with query-adaptive re-ranking for image retrieval. IEEE Trans Multimedia 9210:1–15. https://doi.org/10.1109/TMM.2020.2994509

    Article  Google Scholar 

  74. Vadlamudi LN, Vaddella RPV, Devara V (2018) Robust image hashing using SIFT feature points and DWT approximation coefficients”. ICT Express 4(3):154–159. https://doi.org/10.1016/j.icte.2017.12.004

    Article  Google Scholar 

  75. H. Wang and H. Wang (2018) Perceptual hashing-based image copy-move forgery detection. Secur Commun Netw, 11

  76. Wang X, Zhou X, Zhang Q, Xu B, Xue J (2020) Image alignment based perceptual image hash for content authentication. Signal Process Image Commun. 80:115642. https://doi.org/10.1016/j.image.2019.115642

    Article  Google Scholar 

  77. Wang Z, Zhang Z, Luo Y, Huang Z, Shen HT (2020) Deep collaborative discrete hashing with semantic-invariant structure construction. IEEE Trans Multimedia 9210:1–13. https://doi.org/10.1109/TMM.2020.2995267

    Article  Google Scholar 

  78. Weng L, Preneel B (2011) A secure perceptual hash algorithm for image content authentication. In: Lecture notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7025 LNCS, pp. 108–121, doi: https://doi.org/10.1007/978-3-642-24712-5_9.

  79. Wu D, Zhou X, Niu X (2009) A novel image hash algorithm resistant to print—scan. Signal Process 89(12):2415–2424. https://doi.org/10.1016/j.sigpro.2009.05.016

    Article  MATH  Google Scholar 

  80. Xiang S, Kim HJ (2011) Histogram-based image hashing for searching content-preserving copies. In: Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6730 LNCS, pp. 83–108, doi: https://doi.org/10.1007/978-3-642-24556-5_5.

  81. Xiang S, Yang J (2012) Block-based image hashing with restricted blocking strategy for rotational robustness. EURASIP J Adv Signal Process 2012(1):1–13. https://doi.org/10.1186/1687-6180-2012-77

    Article  Google Scholar 

  82. Yan CP, Pun CM, Yuan XC (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Process 121:1–16. https://doi.org/10.1016/j.sigpro.2015.10.027

    Article  Google Scholar 

  83. Yan CP, Pun CM, Yuan XC (2016) Quaternion-based image hashing for adaptive tampering localization. IEEE Trans Inf Forensics Secur 11(12):2664–2677. https://doi.org/10.1109/TIFS.2016.2594136

    Article  Google Scholar 

  84. Yang H, Yin J, Jiang M (2018) Perceptual image hashing using latent low-rank representation and uniform LBP. Appl Sci. https://doi.org/10.3390/app8020317

    Article  Google Scholar 

  85. Yang J, Zhang Y, Feng R, Zhang T, Fan W (2019) Deep reinforcement hashing with redundancy elimination for effective image retrieval. Pattern Recognit. https://doi.org/10.1016/j.patcog.2019.107116

    Article  Google Scholar 

  86. Yao H, Wei H, Qin C, Tang Z (2020) A real-time reversible image authentication method using uniform embedding strategy. J Real-Time Image Proc 17(1):41–54. https://doi.org/10.1007/s11554-019-00904-8

    Article  Google Scholar 

  87. Zhai H, Lai S, Jin H, Qian X, Mei T (2020) Deep Transfer Hashing for Image Retrieval. IEEE Trans Circuits Syst Video Technol 31(2):1–12. https://doi.org/10.1109/TCSVT.2020.2991171

    Article  Google Scholar 

  88. Zhang X, Yan H, Zhang L, Wang H (2020) High-resolution remote sensing image integrity authentication method considering both global and local features. ISPRS Int J Geo-Inform 9(4):1–20. https://doi.org/10.3390/ijgi9040254

    Article  Google Scholar 

  89. Zhao Y, Yuan X (2020) Perceptual image hashing based on color structure and intensity gradient. IEEE Access 8:26041–26053. https://doi.org/10.1109/ACCESS.2020.2970757

    Article  Google Scholar 

  90. Zheng X, Zhang Y, Lu X (2020) Deep balanced discrete hashing for image retrieval. Neurocomputing. https://doi.org/10.1016/j.neucom.2020.04.037

    Article  Google Scholar 

  91. Zhou M, Zeng X, Chen A (2019) Deep forest hashing for image retrieval. Pattern Recognit 95:114–127. https://doi.org/10.1016/j.patcog.2019.06.005

    Article  Google Scholar 

  92. Zhu L, Lu X, Cheng Z, Li J, Zhang H (2020) Deep Collaborative Multi-View Hashing for Large-Scale Image Search. IEEE Trans Image Process 29:4643–4655

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors would like to acknowledge all the members of the speech and Image` Processing` Laboratory of the ECE Department, NIT Silchar, Assam, India, for providing valuable suggestions and essential facilities to completing this work.

Funding

No fund has been received.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdul Subhani Shaik.

Ethics declarations

Conflict of interest

Authors declare that this work has not been published previously, nor there for consideration in elsewhere. The authors declare that there is no conflict of interests.

Ethical approval

Not Applicable.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shaik, A.S., Karsh, R.K., Islam, M. et al. A review of hashing based image authentication techniques. Multimed Tools Appl 81, 2489–2516 (2022). https://doi.org/10.1007/s11042-021-11649-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11649-7

Keywords

Navigation