Skip to main content
Log in

Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication

  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

Image hashing is one of the multimedia protection techniques. In this paper, a new method for robust image hashing based on quaternion polar complex exponential transform (QPCET) is proposed. The proposed method targets two goals. The first goal is the robustness against geometric and common signal processing attacks. The second one is authenticating color images without conversion which keeps their color information. In the proposed method, the input color image is normalized by the bicubic interpolation and then the interpolated image passes to Gaussian low-pass filter. QPCET moments are used to extract features. Finally, the hash value is calculated using the extracted features. On the sender side, a secret key is utilized to increase the protection of the hash value before transmitting it. The hash value is attached with the transmitted color image. On the receiver side, the authenticity of the received image is checked by decrypting the hash value. Euclidean distance is used to check the similarity between different hashes. Results of the conducted experiments prove the robustness of proposed hash against different geometric and signal processing attacks. Also, it preserves the content of the transmitted color image. Hashing different images has a very low collision probability which ensure the suitability of the proposed method for image authentication. Comparison with the existing methods ensures the superiority of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. F. Ahmed, M. Siyal, V. Uddin Abbas, A secure and robust hash-based scheme for image authentication. Signal Process. 90(5), 1456–1470 (2010)

    Article  Google Scholar 

  2. Y. Chen, W. Yu, J. Feng, Robust image hashing using invariants of Tchebichef moments. Optik 125(19), 5582–5587 (2014)

    Article  Google Scholar 

  3. T. Fawcett, An introduction to ROC analysis. Pattern Recognit. Lett. 27(8), 861–874 (2006)

    Article  MathSciNet  Google Scholar 

  4. L. Ghouti, Robust perceptual color image hashing using quaternion singular value decomposition, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (2014). http://doi.org/10.1109/ICASSP.2014.6854311

  5. W.R. Hamilton, Elements of Quaternions (Longmans Green, London, 1866)

    Google Scholar 

  6. K.M. Hosny, Accurate circular moment invariants of gray-level images. J. Comput. Sci. 7(5), 715–722 (2011)

    Article  Google Scholar 

  7. K.M. Hosny, New set of Gegenbauer moment invariants for pattern recognition applications. Arab. J. Sci. Eng. 39(10), 7097–7107 (2014)

    Article  Google Scholar 

  8. K.M. Hosny, M.M. Darwish, Highly accurate and numerically stable higher order QPCET moments for color image representation. Pattern Recognit. Lett. 97(1), 29–36 (2017)

    Article  Google Scholar 

  9. K.M. Hosny, M.A. Shuman, H.M. Abdel Salam, Fast computation of orthogonal Fourier–Mellin moments in polar coordinates. J. Real-Time Image Process. 6(2), 73–80 (2011)

    Article  Google Scholar 

  10. http://sipi.usc.edu/database/database.php?volume=misc

  11. http://tabby.vision.mcgill.ca/html/browsedownload.html

  12. S. Jothimani, P. Betty, A survey on image authentication techniques. IJETT 7(4), 184–186 (2014)

    Article  Google Scholar 

  13. Y. Lei, Y. Wang, J. Huang, Robust image hash in Radon transform domain for authentication. Signal Process. Image Commun. 26, 280–288 (2011)

    Article  Google Scholar 

  14. V. Monga, M. Mihcak, Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forensics Secur. 2(3), 376–390 (2007)

    Article  Google Scholar 

  15. J. Ouyang, G. Coatrieux, H. Shu, Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform. Digit. Signal Process. 41, 98–109 (2015)

    Article  Google Scholar 

  16. J. Ouyang, X. Wen, J. Liu, Robust hashing based on quaternion zernike moments for image authentication. ACM Trans. Multimed. Comput. Commun. Appl. 12(4s), 1–13 (2016)

    Article  Google Scholar 

  17. C. Qin, C. Chang, P. Tsou, Robust image hashing using non-uniform sampling in discrete fourier domain. Digit. Signal Process. 23(2), 578–585 (2013)

    Article  MathSciNet  Google Scholar 

  18. L. Sebastian, A. Varghese, T. Manesh, Image authentication by content preserving robust image hashing using local and global features. Procedia Comput. Sci. 46, 1554–1560 (2015)

    Article  Google Scholar 

  19. A. Swaminathan, Y. Mao, M. Wu, Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(1), 215–230 (2006)

    Article  Google Scholar 

  20. Z. Tang, Y. Dai, X. Zhang, Perceptual hashing for color images using invariant moments. Appl. Math. Inf. Sci. 6(2s), 643S–650S (2012)

    Google Scholar 

  21. Z. Tang, F. Yang, L. Huanga, X. Zhang, Robust image hashing with dominant DCT coefficients. Optik 125, 5102–5107 (2014)

    Article  Google Scholar 

  22. X. Wang, W. Li, H. Yang, P. Wang, Y. Li, Quaternion polar complex exponential transform for invariant color image description. Appl. Math. Comput. 256, 951–967 (2015)

    MathSciNet  MATH  Google Scholar 

  23. L. Weng, B. Preneel, A secure perceptual hash algorithm for image content authentication. IFIP Int. Fed. Inf. Process. 7025, 108–121 (2011)

    Google Scholar 

  24. Y. Zhao, Perceptual image hash using texture and shape feature. J. Comput. Inf. Syst. 8(8), 3519–3526 (2012)

    Google Scholar 

  25. Y. Zhao, S. Wang, G. Feng, Z. Tang, A robust image hashing method based on Zernike moments. J. Comput. Inf. Syst. 6(3), 717–725 (2010)

    Google Scholar 

  26. Y. Zhao, Y. Yuan, W. Wei, Extraction of shape feature for image hash. J. Comput. Inf. Syst. 7(16), 5660–5667 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khalid M. Hosny.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hosny, K.M., Khedr, Y.M., Khedr, W.I. et al. Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication. Circuits Syst Signal Process 37, 5441–5462 (2018). https://doi.org/10.1007/s00034-018-0822-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-018-0822-8

Keywords

Navigation