Skip to main content

Image Feature Extract and Performance Analysis Based on Slant Transform

  • Conference paper
  • First Online:
Computational Intelligence and Intelligent Systems (ISICA 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 575))

  • 1634 Accesses

Abstract

In order to improve the efficient and simple the steps of generation an image hashing, a security and robustness image hashing algorithm based on Slant transform (ST) is proposed in this paper. By employing coefficients of Slant transform, a robust hashing sequence is obtained by preprocessing, feature extracting and post processing. The security of proposed algorithm is totally depended on the user-key which are saved as secret keys. For illustration, several benchmark images are utilized to show the feasibility of the image hashing algorithm. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as JPEG compression, mid-filtering, and rotation. Therefore, the scheme proposed in this paper is suitable for image authentication, content-based image retrieval and digital watermarking, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Soo, C.P., Jian, J.D.: Closed-form discrete fraction and affine Fourier transforms. J. IEEE Trans. Signal Process. 48(5), 1338–1353 (2000)

    Article  MATH  Google Scholar 

  2. Ozaktas, H.M., Arikan, O.: Digital computation of the fractional Fourier transform. J. IEEE Trans. Signal Process. 9, 2141–2149 (1996)

    Article  Google Scholar 

  3. Pei, S.C., Yeh, M.H.: Two Dimensional discrete fractional Fourier transform. J. Signal Process. 67, 99–108 (1998)

    Article  MATH  Google Scholar 

  4. Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: IEEE Conference on Image Processing, pp. 664–666 (2000)

    Google Scholar 

  5. Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: IEEE International Conference on Information Technology: Coding and Computing, pp. 178–183 (2000)

    Google Scholar 

  6. Mihcak, K., Venkatesan, R.: New iterative geometric techniques for robust image hashing. In: ACM Workshop on Security and Privacy in Digital Rights Management Workshop, pp. 13–21 (2001)

    Google Scholar 

  7. Enomoto, H., Shibata, K.: Orthogonal transform coding system for television signals. IEEE Trans. Electromagn. Compat. 13(3), 11–17 (1971)

    Article  MathSciNet  Google Scholar 

  8. Vaid, S., Mishra, D.: Comparative analysis of palm-vein recognition system using basic transforms. In: IEEE International Advance Computing Conference, pp. 1105–1110 (2015)

    Google Scholar 

  9. Gupta, J., Chanda, B.: An efficient slope and slant correction technique for off-line handwritten text word. In: 4th International Conference of Emerging Applications of Information Technology, pp. 204–208 (2014)

    Google Scholar 

  10. Jin, L., Qian, W., Cong, W., Ning, C., Kui R., Wenjing, L.: Fuzzy keyword search over encrypted data in cloud computing. In: the 29th IEEE International Conference on Computer Communications (INFOCOM 2010), pp. 441–445. IEEE Press (2010)

    Google Scholar 

  11. Jin, L., Xiaofeng, C., Mingqiang, L., Jingwei, L., Patrick, L., Wenjing, L.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel and Distrib. Syst. 25(6), 1615–1625 (2014)

    Article  Google Scholar 

  12. Jin, L., Man, H.A., Willy, S., Dongqing, X., Kui, R.: Attribute-based signature and its applications. In: 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), pp. 60–69. ACM (2010)

    Google Scholar 

Download references

Acknowledgments

The work presented in this paper was supported by Guangdong Provincial Science and Technology Program (No. 2014A020208139); Distinguished Young Talents in Higher Education of Guangdong (No. 2013LYM-0057). Delong Cui is corresponding author.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Delong Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Zuo, J., Cui, D., Yu, H., Li, Q. (2016). Image Feature Extract and Performance Analysis Based on Slant Transform. In: Li, K., Li, J., Liu, Y., Castiglione, A. (eds) Computational Intelligence and Intelligent Systems. ISICA 2015. Communications in Computer and Information Science, vol 575. Springer, Singapore. https://doi.org/10.1007/978-981-10-0356-1_52

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0356-1_52

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0355-4

  • Online ISBN: 978-981-10-0356-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics