By Topic

On the use of hash functions for defect detection in textures for in-camera web inspection systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
I. C. Baykal ; VLSI Res. Group, Windsor Univ., Ont., Canada ; R. Muscedere ; G. A. Jullien

Hash functions are one way functions which are used in cryptography to ensure integrity of files by creating a binary signature specific to that file. A family of special hash functions are developed, which are simple enough to fit into a small FPGA and can generate one dimensional signatures of repeating texture images. While these hash functions are sensitive enough to detect small changes and defects in texture, they are immune to change in illumination and contrast. Analyses of these signatures and determination of the parameters of the hash functions are presented.

Published in:

Circuits and Systems, 2002. ISCAS 2002. IEEE International Symposium on  (Volume:5 )

Date of Conference: