CFP last date
20 January 2025
Reseach Article

Image Hash using Neural Networks

by Veena Desai, D H Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 22
Year of Publication: 2013
Authors: Veena Desai, D H Rao
10.5120/10765-5578

Veena Desai, D H Rao . Image Hash using Neural Networks. International Journal of Computer Applications. 63, 22 ( February 2013), 12-18. DOI=10.5120/10765-5578

@article{ 10.5120/10765-5578,
author = { Veena Desai, D H Rao },
title = { Image Hash using Neural Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 22 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number22/10765-5578/ },
doi = { 10.5120/10765-5578 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:06.365679+05:30
%A Veena Desai
%A D H Rao
%T Image Hash using Neural Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 22
%P 12-18
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Hash functions have been used to generate hash codes for data authentication. Traditionally these functions are generated using byte oriented algorithms like MD5 and others. In our paper we propose a new method of generating hash code for images using neural networks. Three sample images namely, fingerprint, lena and football image have been considered and their hash values calculated using two neural network structures namely, 1) structure without feedback 2) structure with feedback. The original images are then subjected to bit modification,Gaussian noise and rotational noise. The hash values are recalculated for the modified images. Sensitivity and hit collision are calculated and are found to be comparable with that of MD5 algorithm.

References
  1. Khalil Shihab, "A Back propagation Neural Network for Computer Network Security" Journal of Computer Science 2 (9): 710-715, 2006.
  2. 2. D. A. Karras and V. Zorkadis. On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators. Neural Networks, Vol. 16, No. 5-6, June - July, 2003: 899-905.
  3. S. G. Lian, G. R. Chen, A. Cheung, Z. Q. Wang. A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. In: Processing of 2004 IEEE Symposium on Neural Networks (ISNN2004), Dalian, China, Springer LNCS, 3174 (2004) 627-632.
  4. V. V Desai,V B Deshmukh,Rao D H "Pseudo random number generator using Elman neural nework",RAICS, IEEE conf. proceedings,pp. 251-254, Nov 2011.
  5. V. V Desai, Ravindra. . T. P, V B Deshmukh, Rao D H "Pseudo random number generator using Time Delay neural nework",World Journal of Science Technology,2012,2(10):165-169
  6. C. -K. Chan and L. M. Cheng. The convergence properties of a clipped Hopfield network and its application in the design of key stream generator, IEEE Transactions on Neural Networks, Vol. 12, No. 2, pp. 340-348, March 2001.
  7. Liew Pol Yee and De Silva, L. C. "Application of Multilayer Perceptron Networks in symmetric block ciphers" Proceedings of the 2002 International Joint Conference on Neural Networks, Honolulu, HI, USA, Vol. 2, 12-17 May2002:1455-1458.
  8. Yi Du, Detang Lu, Daolun Li, "An Effective Hash-based Method for Generating Synthetic Well Log" 2008 IEEE.
  9. Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang, "Hash Function Based on Chaotic Neural Networks" IEEE, 2006.
  10. Shiguo Lian, Jinsheng Sun, Zhiquan Wang, "One-way Hash Function Based on Neural Network" Journal of Information Assurance and Security, 2006.
  11. Qinghua Zhang, Han Zhang and Zhaohui Li "One-way Hash Function Construction Based on Conservative Chaotic Systems" Journal of Information Assurance and Security, 5, pp. 171-178, 2010.
  12. Qun-ting Yang, Tie-gang Gao, Li Fan, Qiao-lun Gu "Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network" Fifth International Conference on Information Assurance and Security, 2009.
  13. L. P. Yee, D. L. C. Silva, "Application of Multilayer Perceptron Network as a One-way Hash Function" International Joint Conference on Neural Networks, Vol. 2, 2002
Index Terms

Computer Science
Information Sciences

Keywords

Image hash neural hash hash sensitivity hit collision