2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS) 2009
DOI: 10.1109/ispacs.2009.5383770
|View full text |Cite
|
Sign up to set email alerts
|

A key-dependent secure image hashing scheme by using Radon transform

Abstract: The perceptual image hashing is an emerging technique which can be used in image authentication and contentbased image retrieval. Recently, several image hashing schemes based on Radon transform are proposed for image authentication and retrieval. These schemes have no random information to strengthen the security with image hashing. In this paper, we propose a simple key-based secure image hashing scheme by using radon transform and 1-D Discrete Cosine Transform (DCT). Particularly, we introduce a randomizati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
51
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(51 citation statements)
references
References 9 publications
(12 reference statements)
0
51
0
Order By: Relevance
“…To illustrate our superiority in classification performances, we compare our hashing with some notable image hashing algorithms including LLE-based hashing [18], RT-DCT hashing [16], GF-LVQ hashing [20] and CVA-DWT hashing [22]. To ensure fair comparisons, the test images used in Sections 3.1 and 3.2 are also taken here.…”
Section: Performance Comparisons With Notable Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…To illustrate our superiority in classification performances, we compare our hashing with some notable image hashing algorithms including LLE-based hashing [18], RT-DCT hashing [16], GF-LVQ hashing [20] and CVA-DWT hashing [22]. To ensure fair comparisons, the test images used in Sections 3.1 and 3.2 are also taken here.…”
Section: Performance Comparisons With Notable Algorithmsmentioning
confidence: 99%
“…This scheme is resistant to JPEG compression and watermark embedding, but sensitive to image rotation. In another work, Ou et al [16] used RT combining with discrete cosine transform (DCT) to generate image hashes. The RT-DCT hashing is resilient to image rotation, but its discrimination is not good enough.…”
Section: Introductionmentioning
confidence: 99%
“…Wu, Zhou and Niu suggest a robust hashing method based on the radon and wavelet transform which can resist the printscan attacks, but the method doesn't own good key-dependent security [8]. Other improved radon-based hashing methods using image normalization and the key-dependent secure hashing methods based on radon transform also have been proposed [9], [10]. These methods are robust to small angle rotation, but their discriminations are not desirable.…”
Section: Introductionmentioning
confidence: 99%
“…In order to make up for the disadvantage of the traditional cryptographic hash functions in image authentication, robust image hashing was first introduced by Schneider et al [2]. Subsequently, it is has been widely applied in image authentication [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%