A comparative study of perceptual hashing algorithms: Application on fingerprint images

dc.contributor.authorHamadouche, Maamar
dc.contributor.authorZebbiche, Khalil
dc.contributor.authorGuerroumi, Mohamed
dc.contributor.authorTebbi, Hanane
dc.contributor.authorZafoune, Youcef
dc.date.accessioned2024-03-11T18:43:43Z
dc.date.available2024-03-11T18:43:43Z
dc.date.issued2021-05-25
dc.description.abstractPerceptual image hashing has been broadly used in the literature to authenticate images or to identify similar contents for image copy detection. It can be used to improve the security of fingerprint-based identification systems, especially to guarantee the authenticity of fingerprint images. In this paper, a comparative study of the most used techniques in the field of perceptual hashing is provided, aiming at evaluating their performance when applied to fingerprint images. The study includes five techniques, namely: A-Hash, D-Hash, P-Hash, WHash and SVD-Hash. The performance has been assessed in terms of perceptual robustness, discrimination capability and authentication characteristics, through extensive experiments. The obtained results are promising and show that overall both the A-Hash and P-Hash performed well when compared to other evaluated techniques.
dc.identifier.isbn978-9931-9788-0-0
dc.identifier.urihttp://dspace.univ-oeb.dz:4000/handle/123456789/18702
dc.language.isoen
dc.publisherUniversity of Oum El Bouaghi
dc.subjectPerceptual hashing; fingerprint images; robust hashing.
dc.titleA comparative study of perceptual hashing algorithms: Application on fingerprint images
dc.typeArticle
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
A comparative study of perceptual hashing algorithms ; Application on fingerprint images-1-6.pdf
Size:
444.63 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: