Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication

被引:25
|
作者
Hosny, Khalid M. [1 ]
Khedr, Yasmeen M. [1 ]
Khedr, Walid I. [1 ]
Mohamed, Ehab R. [1 ]
机构
[1] Zagazig Univ, Dept Informat Technol, Fac Comp & Informat, Zagazig 44519, Egypt
关键词
Quaternion polar complex exponential transform moment; Image hashing; Image authentication; Geometric attacks; ROC; SECURE; INVARIANTS; MOMENTS;
D O I
10.1007/s00034-018-0822-8
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Image hashing is one of the multimedia protection techniques. In this paper, a new method for robust image hashing based on quaternion polar complex exponential transform (QPCET) is proposed. The proposed method targets two goals. The first goal is the robustness against geometric and common signal processing attacks. The second one is authenticating color images without conversion which keeps their color information. In the proposed method, the input color image is normalized by the bicubic interpolation and then the interpolated image passes to Gaussian low-pass filter. QPCET moments are used to extract features. Finally, the hash value is calculated using the extracted features. On the sender side, a secret key is utilized to increase the protection of the hash value before transmitting it. The hash value is attached with the transmitted color image. On the receiver side, the authenticity of the received image is checked by decrypting the hash value. Euclidean distance is used to check the similarity between different hashes. Results of the conducted experiments prove the robustness of proposed hash against different geometric and signal processing attacks. Also, it preserves the content of the transmitted color image. Hashing different images has a very low collision probability which ensure the suitability of the proposed method for image authentication. Comparison with the existing methods ensures the superiority of the proposed method.
引用
收藏
页码:5441 / 5462
页数:22
相关论文
共 50 条
  • [41] A Survey on Image Hashing for Image Authentication
    Ou, Yang
    Rhee, Kyung Hyune
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (05): : 1020 - 1030
  • [42] A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication
    Shaik, Abdul Subhani
    Karsh, Ram Kumar
    Islam, Mohiul
    Singh, Surendra Pal
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [43] Stirling Transform based Color Image Authentication
    Ghosal, S. K.
    Mandal, J. K.
    FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 95 - 104
  • [44] A robust image hashing based on discrete wavelet transform
    Singh, Satendra Pal
    Bhatnagar, Gaurav
    2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING APPLICATIONS (ICSIPA), 2017, : 440 - 444
  • [45] Fourier-Mellin Transform for Robust Image Hashing
    Prungsinchai, Supakorn
    Khelifi, Fouad
    Bouridane, Ahmed
    2013 FOURTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2013, : 58 - 61
  • [46] Global Image Registration Based on Invariant Representation of Polar Complex Exponential Transform
    Yi, Meng
    Guo, Bao-Long
    Yan, Chun-Man
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (03) : 853 - 873
  • [47] Image authentication using soft hashing technique
    Ahmed, Fawad
    Siyal, M. Y.
    2007 6TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS & SIGNAL PROCESSING, VOLS 1-4, 2007, : 1416 - +
  • [48] Lossless robust image watermarking by using polar harmonic transform
    Hu, Runwen
    Xiang, Shijun
    SIGNAL PROCESSING, 2021, 179
  • [49] Robust image registration using log-polar transform
    Wolberg, G
    Zokai, S
    2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL I, PROCEEDINGS, 2000, : 493 - 496
  • [50] A Novel Robust Image-hashing Method for Content Authentication
    Jiang, Cuiling
    Pang, Yilin
    Wu, Anwen
    2015 INTERNATIONAL SYMPOSIUM ON SECURITY AND PRIVACY IN SOCIAL NETWORKS AND BIG DATA (SOCIALSEC 2015), 2015, : 22 - 27