Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication

Faculty Computer Science Year: 2018
Type of Publication: ZU Hosted Pages:
Authors:
Journal: crossmark crossmark Volume:
Keywords : Robust Color Image Hashing Using Quaternion    
Abstract:
Image hashing is one of the multimedia protection techniques. In this paper, a newmethod for robust image hashing based on quaternion polar complex exponential transform (QPCET) is proposed. The proposed method targets two goals. The firs
   
     
 
       

Author Related Publications

  • Ehab Roshdy Mohamed, "SEMANTIC REPRESENTATION OF MUSIC DATABASE USING NEW ONTOLOGY-BASED SYSTEM", Journal of Theoretical and Applied Information Technology, 2020 More
  • Ehab Roshdy Mohamed, "Building a New Semantic Social Network Using Semantic Web-Based Techniques", ِASPG, 2021 More
  • Ehab Roshdy Mohamed, "New Graphical Ultimate Processor for Mapping Relational Database to Resource Description Framework", IEEE, 2022 More
  • Ehab Roshdy Mohamed, "Solving systems of nonlinear equations via conjugate direction flower pollination algorithm", inderscience, 2017 More
  • Ehab Roshdy Mohamed, "Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage", IEEE, 2019 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Enhanced inter-ASN handover authentication scheme for IEEE 802.16m network", Institution of Engineering and Technology United Kingdom, 2015 More
  • Walid Ibrahim Ibrahim Khedr, "Improved Lightweight Authentication Scheme For Ieee 802.11P Vehicle-to-Infrastructure Communications", Old City Publishing, Inc., USA, 2015 More
  • Khalied Mohamed Hosny, "Performance Analysis of Invariant Quaternion Moments in Color Image Watermarking", Springer, 2019 More
  • Amir El Sayed Godaa Hassan, "FOUR-PHASE PROTOCOL FOR DETECTION, DELETION, PROTECTION AND RECOVERY FROM AUTORUN VIRUS", Journal of Theoretical and Applied Information Technology, 2018 More
  • Walid Ibrahim Ibrahim Khedr, "Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage", IEEE, 2019 More
Tweet