Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication

被引:26
作者
Hosny, Khalid M. [1 ]
Khedr, Yasmeen M. [1 ]
Khedr, Walid I. [1 ]
Mohamed, Ehab R. [1 ]
机构
[1] Zagazig Univ, Dept Informat Technol, Fac Comp & Informat, Zagazig 44519, Egypt
关键词
Quaternion polar complex exponential transform moment; Image hashing; Image authentication; Geometric attacks; ROC; SECURE; INVARIANTS; MOMENTS;
D O I
10.1007/s00034-018-0822-8
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Image hashing is one of the multimedia protection techniques. In this paper, a new method for robust image hashing based on quaternion polar complex exponential transform (QPCET) is proposed. The proposed method targets two goals. The first goal is the robustness against geometric and common signal processing attacks. The second one is authenticating color images without conversion which keeps their color information. In the proposed method, the input color image is normalized by the bicubic interpolation and then the interpolated image passes to Gaussian low-pass filter. QPCET moments are used to extract features. Finally, the hash value is calculated using the extracted features. On the sender side, a secret key is utilized to increase the protection of the hash value before transmitting it. The hash value is attached with the transmitted color image. On the receiver side, the authenticity of the received image is checked by decrypting the hash value. Euclidean distance is used to check the similarity between different hashes. Results of the conducted experiments prove the robustness of proposed hash against different geometric and signal processing attacks. Also, it preserves the content of the transmitted color image. Hashing different images has a very low collision probability which ensure the suitability of the proposed method for image authentication. Comparison with the existing methods ensures the superiority of the proposed method.
引用
收藏
页码:5441 / 5462
页数:22
相关论文
共 50 条
  • [41] Two Robust Perceptual Image Hashing Schemes Based on Discrete Wavelet Transform
    Hu, Chunqiang
    Yang, Feihong
    Xing, Xiaoshuang
    Liu, Hang
    Xiang, Tao
    Xia, Hui
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (04) : 6533 - 6546
  • [42] Image hashing with color vector angle
    Tang, Zhenjun
    Li, Xuelong
    Zhang, Xianquan
    Zhang, Shichao
    Dai, Yumin
    NEUROCOMPUTING, 2018, 308 : 147 - 158
  • [43] Robust image authentication via locality sensitive hashing with core alignment
    Ma, Qiang
    Xu, Lei
    Xing, Ling
    Wu, Bin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (06) : 7131 - 7152
  • [44] Robust image authentication via locality sensitive hashing with core alignment
    Qiang Ma
    Lei Xu
    Ling Xing
    Bin Wu
    Multimedia Tools and Applications, 2018, 77 : 7131 - 7152
  • [45] Robust Image Hashing Based Efficient Authentication for Smart Industrial Environment
    Sajjad, Muhammad
    Ul Haq, Ijaz
    Lloret, Jaime
    Ding, Weiping
    Muhammad, Khan
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6541 - 6550
  • [46] Image Authentication using Image Hashing based on Ring Partition with Corner Inclusion
    Karsh, Ram Kumar
    Mishra, Himanshu
    Vashist, Tejveer
    Laskar, R. H.
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 557 - 562
  • [47] Research on Copy-Move Image Forgery Detection Using Features of Discrete Polar Complex Exponential Transform
    Gan, Yanfen
    Zhong, Junliu
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2015, 25 (14):
  • [48] Discovery of Tampered Image with Robust Hashing
    Tang, Zhenjun
    Yu, Junwei
    Zhang, Xianquan
    Zhang, Shichao
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2014, 2014, 8933 : 112 - 122
  • [49] Robust image hashing with multidimensional scaling
    Tang, Zhenjun
    Huang, Ziqing
    Zhang, Xianquan
    Lao, Huan
    SIGNAL PROCESSING, 2017, 137 : 240 - 250
  • [50] Robust Image Hashing with Tensor Decomposition
    Tang, Zhenjun
    Chen, Lv
    Zhang, Xianquan
    Zhang, Shichao
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (03) : 549 - 560