2015
DOI: 10.1016/j.dsp.2015.03.006
|View full text |Cite
|
Sign up to set email alerts
|

Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform

Abstract: International audienceIn this work, a novel robust image hashing scheme for image authentication is proposed based on the combination of the quaternion discrete Fourier transform (QDFT) with the log-polar transform. QDFT offers a sound way to jointly deal with the three channels of color images. The key features of the present method rely on (i) the computation of a secondary image using a log-polar transform; and (ii) the extraction from this image of low frequency QDFT coefficients' magnitude. The final imag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 66 publications
(39 citation statements)
references
References 33 publications
0
39
0
Order By: Relevance
“…The performance of a watermarking technique is estimated in terms of robustness, imperceptibility, capacity, and detachment detection. Another paper [90] proposed the combination of the QDFT and a log-polar transform, where the QDFT is the quaternion discrete Fourier transform. The QDFT deals with the three channels (red, green, and blue) of color images.…”
Section: Of 38mentioning
confidence: 99%
“…The performance of a watermarking technique is estimated in terms of robustness, imperceptibility, capacity, and detachment detection. Another paper [90] proposed the combination of the QDFT and a log-polar transform, where the QDFT is the quaternion discrete Fourier transform. The QDFT deals with the three channels (red, green, and blue) of color images.…”
Section: Of 38mentioning
confidence: 99%
“…It can also detect cut and paste attacks. Ouyang et al [11] used Quaternion Discrete Fourier Transforms (QDFT) and Log polar Transform to generate hash for color images. This scheme shows good sensitivity and is robust against content preserving manipulations, especially large angle rotation.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In digital signature based schemes, a hash of the image is captured and asymmetrically encrypted for non-repudiation purpose [7] and transmitted along with the image. At the reception, if the attached signature does not match the recomputed one, the image integrity and origin are not correct.…”
Section: Introductionmentioning
confidence: 99%