scispace - formally typeset
Open AccessJournal ArticleDOI

Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform

TLDR
The results show that the proposed scheme offers a good sensitivity to image content alterations and is robust to the common content-preserving operations, and especially to large angle rotation operations.
About
This article is published in Digital Signal Processing.The article was published on 2015-06-01 and is currently open access. It has received 63 citations till now. The article focuses on the topics: Fractional Fourier transform & Top-hat transform.

read more

Citations
More filters
Journal ArticleDOI

A novel image hashing scheme with perceptual robustness using block truncation coding

TL;DR: Experimental results demonstrate that the proposed scheme has the satisfactory performances of robustness, anti-collision, and security.
Journal ArticleDOI

Digital Image Watermarking Techniques: A Review

TL;DR: Details of standard water marking system frameworks are given and some standard requirements that are used in designing watermarking techniques for several distinct applications are listed.
Journal ArticleDOI

Perceptual hashing for image authentication: A survey

TL;DR: In this article, the general structure and classifications of image hashing based tamper detection techniques with their properties are exploited and the evaluation datasets and different performance metrics are discussed.
Journal ArticleDOI

Perceptual hashing for color images based on hybrid extraction of structural features

TL;DR: Experimental results demonstrate that the proposed novel perceptual hashing scheme for color images can achieve satisfactory performances with respect to perceptual robustness and discrimination.
Journal ArticleDOI

Robust image hashing through DWT-SVD and spectral residual method

TL;DR: An efficient approach to obtain image hash through DWT-SVD and a saliency detection technique using spectral residual model and the receiver operating characteristics shows that the proposed method is better than some state-of-the-art methods.
References
More filters
Journal ArticleDOI

An introduction to ROC analysis

TL;DR: The purpose of this article is to serve as an introduction to ROC graphs and as a guide for using them in research.
Proceedings ArticleDOI

UCID: an uncompressed color image database

TL;DR: A new dataset, UCID (pronounced "use it") - an Uncompressed Colour Image Dataset which tries to bridge the gap between standardised image databases and objective evaluation of image retrieval algorithms that operate in the compressed domain.
Journal ArticleDOI

Robust and secure image hashing

TL;DR: A novel algorithm for generating an image hash based on Fourier transform features and controlled randomization is developed and it is shown that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions.
Journal ArticleDOI

Hypercomplex Fourier Transforms of Color Images

TL;DR: Hypercomplex numbers, specifically quaternions, are used to define a Fourier transform applicable to color images, and the properties of the transform are developed, and it is shown that the transform may be computed using two standard complex fast Fourier transforms.
Related Papers (5)
Frequently Asked Questions (16)
Q1. What have the authors contributed in "Robust hashing for image authentication using quaternion discrete fourier transform and log-polar transform" ?

In this work, a novel robust image hashing scheme for image authentication is proposed based on the combination of the quaternion discrete Fourier transform ( QDFT ) with the log-polar transform. 

By exploiting the QDFT into the log-polar domain, the authors better take into account the three image color planes and the resulting hash is robust to rotation attacks as well as to common image content-preserving operations. Their future work will focus on designing a robust hash capable to locate tampered regions of an image as well as to determine the type of the tampering. 

Since the wavelet transform has a good time-frequency localization property, their method can locate tampered regions with a good accuracy but at the price of a longer image hash. 

Discrete wavelet transform (DWT) -based image hashing methods: Ahmed et al. [1] used a wavelet transform to extract the image features. 

Matrix decomposition-based image hashing methods: Kozat et al. [17] used singular value decomposition (SVD) to get robust image features and to generate an image hash. 

Other robust feature extraction methods for constructing image hashes were also reported including the random Gabor filtering [22], the ring partition [23] and shape contexts [24]. 

Regarding image authentication, a robust image hash should also have good anti-collision (discriminative) capability for visually distinct images as well as a satisfactory level of security in order to make very difficult for an adversary to forge the hash value. 

Battiato et al. [21] adopted an image representation based on a set of SIFT features (called “bag of features”, BOF) to construct the hash and explored a non-uniform quantization of histograms of oriented gradients (HOG) to get tamper localization capabilities. 

In general, the construction of an image hash is based on three basic steps, i.e., pre-processing, image feature extraction and construction of hash. 

This perceptual robustness can be achieved for three main reasons: (i) the generated hash utilizes the low-frequency QDFT coefficients whose interrelation is hardly changed by content-preserving operations; (ii) the average preprocessing filter makes the method more robust against content-preserving operations such as noise, filtering operation and JPEG compression; (iii) the magnitude of QDFT coefficients of the log-polar transformed image is invariant to rotation. 

image hashing methods extract essential image features from which a short binary or real number sequence, called hash, is generated to represent the image content. 

This is due to the joint combination of (i) the low-frequency magnitude coefficients of QDFT, (ii) the log-polar transform of the image central part, and (iii) the filtering operationenhances its robustness and increases its discriminative capability. 

These operations include pepper & salt noise, Gaussian noise, brightness adjustment, different filters, JPEG compression, cropping, scaling and rotation. 

Fig. 12(e), (g), (j) and (k) show that the QDFT3 is not robust to contrast adjustment, median filtering, rotation and cropping attack. 

Liu et al. [15] utilized the wave atom transform to extract image features arguing that this approach has a sparse expansion and is capable to better capture texture properties. 

It can be seen that the time running for the five methods is very short and less than 0.22 s. The DFT method [19] is the fastest and needs only 0.07 s.Table 3 Overall performance comparison of hashing algorithms DFT [16] Zhao [3] NMF [19] QDFT[34]