Robust image hashing using exact Gaussian Hermite moments

Faculty Computer Science Year: 2018
Type of Publication: ZU Hosted Pages:
Authors:
Journal: IET Image Processing IET The Institute of Engineering and Technology Volume:
Keywords : Robust image hashing using exact Gaussian Hermite    
Abstract:
In this work, a new method for robust image hashing is presented. The objectives of image hash are robustness and uniqueness. Exact Gaussian–Hermite moments and their invariants are used to extract highly accurate features for grey-scale images. The hash value is estimated by the sender from the features of the given image and then appended to the image to be sent. On the other hand, the authenticity of the received image has been checked by decrypting the hash value at the receiver side. To increase the level of security, a pre-shared key is used between the sender and the receiver. This process is to encrypt the hash value using a secret key before attaching with the image and then transmitting it. The similarity between different hashes is calculated by using Euclidean distance. Numerical simulation ensures the robustness of the proposed method against different kinds of attacks and preserves the image content. Hash different images exhibit very low collision probability which proves the suitability of the proposed method for robust image hash. The proposed method is compared with the existing hash methods where the obtained results clearly show the superiority of the proposed method
   
     
 
       

Author Related Publications

  • Yasmeen Mohamed Mohamed Khedr, "Robust color image hashing using quaternion polar complex exponential transform for image authentication", Springer, 2018 More
  • Yasmeen Mohamed Mohamed Khedr, "TransMix: Crafting highly transferable adversarial examples to evade face recognition models", Elsevier (Science Direct), 2024 More
  • Yasmeen Mohamed Mohamed Khedr, "Sampling-Based Teacher Guided Method to Boost Transferable Attack on SAR Image Classification", Frontiers in Artificial Intelligence and Applications, 2024 More
  • Yasmeen Mohamed Mohamed Khedr, "Semantic Adversarial Attacks on Face Recognition Through Significant Attributes", Springer, 2023 More
  • Yasmeen Mohamed Mohamed Khedr, "Experimental and numerical modelling of solid and hollow biomass pellets high-temperature rapid oxy-steam combustion: The effect of integrated CO2/H2O concentration", Elsevier, 2021 More

Department Related Publications

  • Nabil Ali Mohamed Lashen, "A SURVEY OF ROUTING PROTOCOLS FOR WIRLESS MESH NETWORKS (WMNS)", AL-AZHAR ENGINEERING TEWELFTH INTERNATIONAL CONFERENCE, 2012 More
  • Khalied Mohamed Hosny, "Multimedia Security Using Encryption: A Survey", IEEE, 2023 More
  • Hanaa Mohamed Hamza Kamal, "Multimedia Security Using Encryption: A Survey", IEEE, 2023 More
  • Nabil Ali Mohamed Lashen, "Multimedia Security Using Encryption: A Survey", IEEE, 2023 More
Tweet