Abstract
In order to improve the efficient and simple the steps of generation an image hashing, a security and robustness image hashing algorithm based on Slant transform (ST) is proposed in this paper. By employing coefficients of Slant transform, a robust hashing sequence is obtained by preprocessing, feature extracting and post processing. The security of proposed algorithm is totally depended on the user-key which are saved as secret keys. For illustration, several benchmark images are utilized to show the feasibility of the image hashing algorithm. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as JPEG compression, mid-filtering, and rotation. Therefore, the scheme proposed in this paper is suitable for image authentication, content-based image retrieval and digital watermarking, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Soo, C.P., Jian, J.D.: Closed-form discrete fraction and affine Fourier transforms. J. IEEE Trans. Signal Process. 48(5), 1338–1353 (2000)
Ozaktas, H.M., Arikan, O.: Digital computation of the fractional Fourier transform. J. IEEE Trans. Signal Process. 9, 2141–2149 (1996)
Pei, S.C., Yeh, M.H.: Two Dimensional discrete fractional Fourier transform. J. Signal Process. 67, 99–108 (1998)
Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: IEEE Conference on Image Processing, pp. 664–666 (2000)
Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: IEEE International Conference on Information Technology: Coding and Computing, pp. 178–183 (2000)
Mihcak, K., Venkatesan, R.: New iterative geometric techniques for robust image hashing. In: ACM Workshop on Security and Privacy in Digital Rights Management Workshop, pp. 13–21 (2001)
Enomoto, H., Shibata, K.: Orthogonal transform coding system for television signals. IEEE Trans. Electromagn. Compat. 13(3), 11–17 (1971)
Vaid, S., Mishra, D.: Comparative analysis of palm-vein recognition system using basic transforms. In: IEEE International Advance Computing Conference, pp. 1105–1110 (2015)
Gupta, J., Chanda, B.: An efficient slope and slant correction technique for off-line handwritten text word. In: 4th International Conference of Emerging Applications of Information Technology, pp. 204–208 (2014)
Jin, L., Qian, W., Cong, W., Ning, C., Kui R., Wenjing, L.: Fuzzy keyword search over encrypted data in cloud computing. In: the 29th IEEE International Conference on Computer Communications (INFOCOM 2010), pp. 441–445. IEEE Press (2010)
Jin, L., Xiaofeng, C., Mingqiang, L., Jingwei, L., Patrick, L., Wenjing, L.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel and Distrib. Syst. 25(6), 1615–1625 (2014)
Jin, L., Man, H.A., Willy, S., Dongqing, X., Kui, R.: Attribute-based signature and its applications. In: 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), pp. 60–69. ACM (2010)
Acknowledgments
The work presented in this paper was supported by Guangdong Provincial Science and Technology Program (No. 2014A020208139); Distinguished Young Talents in Higher Education of Guangdong (No. 2013LYM-0057). Delong Cui is corresponding author.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Zuo, J., Cui, D., Yu, H., Li, Q. (2016). Image Feature Extract and Performance Analysis Based on Slant Transform. In: Li, K., Li, J., Liu, Y., Castiglione, A. (eds) Computational Intelligence and Intelligent Systems. ISICA 2015. Communications in Computer and Information Science, vol 575. Springer, Singapore. https://doi.org/10.1007/978-981-10-0356-1_52
Download citation
DOI: https://doi.org/10.1007/978-981-10-0356-1_52
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0355-4
Online ISBN: 978-981-10-0356-1
eBook Packages: Computer ScienceComputer Science (R0)