Abstract
With the current boom in smartphones and social media, image sharing faces problems, like redundant data. Thereby, compromises the storage of a user?s device. In this paper, we design an image hashing and verification technique to check for redundancy. The algorithm creates a hash of the image and is stored along with the image before sending. Upon receiving an image, its hash code is retrieved from the image and is cross referenced with the lookup table in the device. If an entry already exists, the received image is discarded. This reduces the storage of redundant images in the device and thereby avoids wastage of device memory.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Venkatesan, R., Koon, S.M., Jakubowski, M.H.: Robust image hashing. In: Proceedings of the 2000 International Conference on Image Processing (2000)
Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(2), 215-230
Zhang, W., Wong, K., Yu, H., Zhu, Z.: A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun. Nonlinear Sci. Numer. Simul. 18(3), 584?600 (2013)
Monga, V., Banerjee, A., Evans, B.L.: A clustering based approach to perceptual image hashing. IEEE Trans. Inf. Forensics Secur. 1, 68?79 (2006)
Hughes, D.A., Burns, J., Yin, Z.: Data matching using flow based packet data storage US8929380 B1 (2015)
Douglis, F., Kulkarni, P., LaVoie, J.D., Tracey, J.M.: Method and apparatus for data redundancy elimination at the block level, US8135683 B2 (2012)
Zhang, Y., Ansari, N.: On protocol-independent data redundancy elimination. IEEE (2014)
Sri Gurubaran, B., Sasikala Devi, N., Subramanian, E.R.S., Geophilus, D.: Non-deterministic image encryption based on symmetric cryptosystem. Procedia Comput. Sci. 93, 791?798 (2016)
Gallagher, P., Director, A.: Secure hash standard (shs). FIPS PUB, 180?183 (1995):
Daemen, J., Rijmen, V.: The rijndael algorithm. In: The First Advanced Encryption Standard Candidate Conference 1998
Schneier, B.: Algorithm Types and Modes. Applied Cryptography, 2nd edn., 20th Anniversary Edition, pp. 189?211(1996)
Kawaguchi, E., Eason, R.O.: Principle and applications of BPCS-steganography. In: Proceedings of SPIE- The International Society for Optical Engineering. vol. 3528 (1999)
Liang, Y.D., et al.: Object Oriented Programming with (1987)
Girault, M., Cohen, R., Campana, M.: A generalized birthday attack. In: Advances in Cryptology?EUROCRYPT 1988. Springer, Heidelberg (1988)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Sri Gurubaran, B., Shailesh Dheep, G., Subramanian, E.R.S., Aishwarya, V., Umamakeswari, A. (2019). Storage Optimization Using Secure Image Hashing. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Advances in Information and Communication Networks. FICC 2018. Advances in Intelligent Systems and Computing, vol 886. Springer, Cham. https://doi.org/10.1007/978-3-030-03402-3_48
Download citation
DOI: https://doi.org/10.1007/978-3-030-03402-3_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03401-6
Online ISBN: 978-3-030-03402-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)