64 research outputs found

    Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform

    No full text
    International audienceIn this work, a novel robust image hashing scheme for image authentication is proposed based on the combination of the quaternion discrete Fourier transform (QDFT) with the log-polar transform. QDFT offers a sound way to jointly deal with the three channels of color images. The key features of the present method rely on (i) the computation of a secondary image using a log-polar transform; and (ii) the extraction from this image of low frequency QDFT coefficients' magnitude. The final image hash is generated according to the correlation of these magnitude coefficients and is scrambled by a secret key to enhance the system security. Experiments were conducted in order to analyze and identify the most appropriate parameter values of the proposed method and also to compare its performance to some reference methods in terms of receiver operating characteristics curves. The results show that the proposed scheme offers a good sensitivity to image content alterations and is robust to the common content-preserving operations, and especially to large angle rotation operations

    Duality Property of Discrete Quaternion Fourier Transform

    Get PDF
    We introduce the discrete quaternionic Fourier transform (QDFT), which is generalization of discrete Fourier transform. We establish the version discrete of duality property duality related to the QDFT

    A Color Image Watermarking Scheme Based On QR Factorization, Logistic and Lorentz Chaotic Maps

    Get PDF
    Most of the existing color image watermarking schemes use grayscale or binary image as watermark because color image watermark has more data than grayscale or binary watermark. Therefore, it is a challenging issue to design a color image-watermarking scheme. This paper proposes a novel color image watermarking scheme to embed color image watermark into color host image. In watermarking schemes, first divide the host and watermark image into non-overlapping blocks, apply the Discrete Cosine Transformation (DCT) on each blocks of both watermark, and host image. After that QR Factorization, apply on the each blocks of watermark. In this paper, Logistic and Lorentz chaotic maps are usedfor estimating the embedding strength and location. The experimental results reveal that this watermarking scheme is robust against different image processing attacks viz. cropping, contrast adjustment and coloring

    The development of the quaternion wavelet transform

    Get PDF
    The purpose of this article is to review what has been written on what other authors have called quaternion wavelet transforms (QWTs): there is no consensus about what these should look like and what their properties should be. We briefly explain what real continuous and discrete wavelet transforms and multiresolution analysis are and why complex wavelet transforms were introduced; we then go on to detail published approaches to QWTs and to analyse them. We conclude with our own analysis of what it is that should define a QWT as being truly quaternionic and why all but a few of the “QWTs” we have described do not fit our definition
    • …
    corecore