Loading

Authentication of an Image with Sha-1 and Invariant Vector Distances
A.Appala Narasimham1, P.S.Avadhani2

1A.Appala Narasimham, Assistant Professor, Department of CSE, Raghu Engineering College, Visakhapatnam, India.
2Prof. P.S. Avadhani, Department of CS&SE, Andhra University, Visakhapatnam, India.
Manuscript received on October 12, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 2401-2408 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4265119119/2019©BEIESP | DOI: 10.35940/ijitee.A4265.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The two primary objectives of image authentication are Discrimination and Robustness. The SHA-1 algorithm, invariant vector distance and ring division are implemented to authenticate the image by using hash value to enhance discriminative capability and rotation robustness. The statistical features like central moments of the picture which contains rings in homogenous CIE L* a * b * model are unwavering because the image rotation is not linked to the ring division. Specifically, the digital operations of an image are not changed with respect to Euclidean distance and feature vectors. This makes message digest discriminative and dense. Several tests conducted with more than 200 color images and reveals that for common image digital operations this algorithm for image authentication is strong to estimate the efficiency. Among all the existing hashing algorithms, the projected technique for image authentication is demonstrated as superior.
Keywords: CIE L* a * b * Mode Image Authentication Ring Partition.
Scope of the Article: Image analysis and Processing