An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding

Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original images and corresponding distorted version, are...

Full description

Bibliographic Details
Main Authors: Ling Du, Zehong He, Yijing Wang, Xiaochao Wang, Anthony T. S. Ho
Format: Article
Language:English
Published: MDPI AG 2020-09-01
Series:Algorithms
Subjects:
Online Access:https://www.mdpi.com/1999-4893/13/9/227