{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:02:16Z","timestamp":1753272136788},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2015,5,5]],"date-time":"2015-05-05T00:00:00Z","timestamp":1430784000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s11042-015-2591-8","type":"journal-article","created":{"date-parts":[[2015,5,4]],"date-time":"2015-05-04T02:01:55Z","timestamp":1430704915000},"page":"6585-6604","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Robust hash generation technique for content-based image authentication using histogram"],"prefix":"10.1007","volume":"75","author":[{"given":"Lokanadham Naidu","family":"Vadlamudi","sequence":"first","affiliation":[]},{"given":"Rama Prasad V.","family":"Vaddella","sequence":"additional","affiliation":[]},{"given":"Vasumathi","family":"Devara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,5]]},"reference":[{"key":"2591_CR1","unstructured":"Ammar M. Hassan et al (2009) Semi fragile image authentication using robust image hashing with localization, in proc. of second int. Conf Mach Vis 133\u2013137"},{"key":"2591_CR2","unstructured":"Black PE (2005) Fisher-Yates shuffle, dictionary of algorithms and data structures. Natl Inst Stand Technol, retrieved 2007"},{"issue":"1","key":"2591_CR3","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11042-010-0724-7","volume":"61","author":"YS Choi","year":"2012","unstructured":"Choi YS, Park JH (2012) Image hash generation method using hierarchical histogram. Int Multimedia Tools Appl 61(1):181\u2013194","journal-title":"Int Multimedia Tools Appl"},{"key":"2591_CR4","unstructured":"Goljan M et al (2001),Distortion-free data embedding for images, in proc. of the 4th Int. Workshop Inf Hiding 25\u201327, pp 27\u201341"},{"issue":"1","key":"2591_CR5","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s10207-009-0093-2","volume":"9","author":"S-H Han","year":"2010","unstructured":"Han S-H, Chu C-H (2010) Content-based image authentication: current status, issues and challenges. Int Inf Secur 9(1):19\u201332","journal-title":"Int Inf Secur"},{"key":"2591_CR6","doi-asserted-by":"crossref","unstructured":"Han-Ling Zhang et al (2009) Content based image hashing robust to geometric transformation, in proc. of second Int. Symp Electron Commer Secur 105\u2013108","DOI":"10.1109\/ISECS.2009.118"},{"issue":"1","key":"2591_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","volume":"39","author":"A Haouzia","year":"2008","unstructured":"Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. J Multimedia Tools Appl 39(1):1\u20134","journal-title":"J Multimedia Tools Appl"},{"key":"2591_CR8","unstructured":"Leest A et al (2003) Reversible image watermarking, in proceedings of the ICIP03. 2:731\u2013734"},{"issue":"6","key":"2591_CR9","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.image.2011.04.007","volume":"26","author":"Y Lei","year":"2011","unstructured":"Lei Y et al (2011) Robust image hash in radon transform domain for authentication. J Signal Process Image Commun 26(6):280\u2013288","journal-title":"J Signal Process Image Commun"},{"issue":"3","key":"2591_CR10","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s00500-009-0529-7","volume":"15","author":"L Wang","year":"2011","unstructured":"Wang L et al (2011) Image authentication based on perceptual hash using Gabor filters. J Soft Comput 15(3):493\u2013504","journal-title":"J Soft Comput"},{"issue":"5","key":"2591_CR11","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1016\/j.jnca.2010.09.001","volume":"34","author":"G Liu","year":"2011","unstructured":"Liu G et al (2011) A passive image authentication scheme for detecting region duplication forgery with rotation. J Netw Comput Appl 34(5):1557\u20131565","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"2591_CR12","first-page":"76","volume":"E87A","author":"T Matsuo","year":"2004","unstructured":"Matsuo T, Kaou K (2004) On parallel hash functions based on block ciphers. Proc IEICE Trans Fundam Electron Commun Comput Sci E87A(1):76\u201374","journal-title":"Proc IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"2591_CR13","unstructured":"Nighat J, Arshad A (2010) A unified approach to secure and robust hashing scheme for image and video authentication, in proc. of 3rd Int. Congr Image and Sig Process 274\u2013278"},{"key":"2591_CR14","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1016\/j.sigpro.2006.11.002","volume":"87","author":"X Qi","year":"2007","unstructured":"Qi X, Qi J (2007) A robust content based digital image watermarking scheme. J Signal Process 87:1264\u20131280","journal-title":"J Signal Process"},{"issue":"1","key":"2591_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1049\/iet-ifs:20070112","volume":"3","author":"SM Saad","year":"2009","unstructured":"Saad SM (2009) Design of a robust and secure digital signature scheme for image authentication over wireless channels. IET Inf Security 3(1):1\u20138","journal-title":"IET Inf Security"},{"key":"2591_CR16","unstructured":"Xiang S et al. (2007), Histogram based image hashing scheme robust against geometric deformations, in proc. of 9 Int. Work Multimedia and Secur 121\u2013128"},{"key":"2591_CR17","first-page":"167","volume":"200","author":"V Skala","year":"2001","unstructured":"Skala V, Kucha M (2001) The hash function and the principle of duality. Proc Int Conf Comput Graph Int 200:167\u2013174","journal-title":"Proc Int Conf Comput Graph Int"},{"key":"2591_CR18","unstructured":"Sun R, Zeng W (2012) Secure and robust image hashing via compressive sensing, in Int. J Multimedia Tools Appl 1\u201315"},{"issue":"1","key":"2591_CR19","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2006.873601","volume":"2","author":"A Swaminathan","year":"2006","unstructured":"Swaminathan A, Mao Y, Min W (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 2(1):215\u2013230","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2591_CR20","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-642-24712-5_9","volume":"7025","author":"L Weng","year":"2011","unstructured":"Weng L, Preneel B (2011) A secure perceptual hash algorithm for image content authentication. Commun Multimedia Secur LNCS 7025:108\u2013121","journal-title":"Commun Multimedia Secur LNCS"},{"key":"2591_CR21","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-642-24556-5_5","volume":"6730","author":"S Xiang","year":"2011","unstructured":"Xiang S, Kim HJ (2011) Histogram based image hashing for searching content-preserving copies. Trans Data Hiding Multimedia Secur VI LNCS 6730:83\u2013108","journal-title":"Trans Data Hiding Multimedia Secur VI LNCS"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2591-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2591-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2591-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:32:18Z","timestamp":1559345538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-2591-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,5]]},"references-count":21,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["2591"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-2591-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,5]]}}}