Skip to main content
Log in

A novel strict color image authentication scheme based on dual-complex LU decomposition

  • Published:
Computational and Applied Mathematics Aims and scope Submit manuscript

Abstract

In this paper, we construct the dual-complex Gauss transformation and propose novel algorithms for LU decomposition and partial pivoting LU decomposition of dual-complex matrices. In addition, the Cholesky and \(\textrm{LDL}^H\) decompositions of dual-complex matrices are also obtained as special cases. Strict authentication is designed to cater to applications that have a zero-tolerance policy for any modifications or alterations made to the protected object. To increase the feasibility, we first propose the dual-complex matrix representation of color images and design a scheme for strict color image authentication by means of the dual-complex LU decomposition. Numerical experiments are provided to demonstrate the efficiency of the algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Fig. 1
Fig. 2
Algorithm 5
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  • Ahmed F, Siyal MY, Abbas VU (2010) A secure and robust hash-based scheme for image authentication. Signal Process 90(5):1456–1470

    Article  Google Scholar 

  • Belferdi W, Noui L, Behloul A (2016) A novel Cholesky decomposition-based scheme for strict image authentication. In: 2nd International conference on pattern analysis and intelligent systems, Khenchela

  • Cayre F, Fontaine C, Furon T (2005) Watermarking security: theory and practice. IEEE Trans Signal Process 53(10):3976–3987

    Article  MathSciNet  Google Scholar 

  • Chen BJ, Shu HZ, Coatrieux G et al (2015) Color image analysis by quaternion-type moments. J Math Imaging Vis 51:124–144

    Article  MathSciNet  Google Scholar 

  • Chen Y, Jia ZG, Peng YX et al (2023) Efficient robust watermarking based on structure-preserving quaternion singular value decomposition. IEEE Trans Image Process 32:3964–3979

    Article  Google Scholar 

  • Clifford WK (1873) Preliminary sketch of bi-quaternions. Proc Lond Math Soc 4:381–395

    Google Scholar 

  • Feng W, Liu ZQ (2008) Region-level image authentication using Bayesian structural content abstraction. IEEE Trans Image Process 17(12):2413–2424

    Article  MathSciNet  Google Scholar 

  • He ZH, Wang XX, Zhao YF (2023) Eigenvalues of quaternion tensors with applications to color video processing. J Sci Comput 94:1

    Article  MathSciNet  Google Scholar 

  • Jia ZG, Wei MS, Zhao MX et al (2018) A new real structure-preserving quaternion QR algorithm. J Comput Appl Math 343:26–48

    Article  MathSciNet  Google Scholar 

  • Jia ZG, Ng MK, Song GJ (2019) Lanczos method for large-scale quaternion singular value decomposition. Numer Algorithms 82:699–717

    Article  MathSciNet  Google Scholar 

  • Li Y, Wei MS, Zhang FX et al (2017) A real structure-preserving method for the quaternion LU decomposition, revisited. Calcolo 54:1553–1563

    Article  MathSciNet  Google Scholar 

  • Li Y, Wei MS, Zhang FX et al (2018) Real structure-preserving algorithms for the quaternion Cholesky decomposition: revisit. J Liaocheng Univ 31(1):21–28

    Google Scholar 

  • Li MJ, Yuan XC, Chen H et al (2020) Quaternion discrete Fourier transform-based color image watermarking method using quaternion QR decomposition. IEEE Access 8:72308–72315

    Article  Google Scholar 

  • Li Y, Wang HX, Barni M (2021) A survey of deep neural network watermarking techniques. Neurocomputing 461:171–193

    Article  Google Scholar 

  • Ling ST, Li YD, Yang B et al (2022a) Joint diagonalization for a pair of Hermitian quaternion matrices and applications to color face recognition. Signal Process 198:108560

    Article  Google Scholar 

  • Ling C, He HJ, Qi LQ (2022b) Singular values of dual quaternion matrices and their low rank approximations. Numer Funct Anal Optim 43(12):1423–1458

    Article  MathSciNet  Google Scholar 

  • Liu QH, Ling ST, Jia ZG (2022) Randomized quaternion singular value decomposition for low rank matrix approximation. SIAM J Sci Comput 44(2):870–900

    Article  MathSciNet  Google Scholar 

  • Liu WK, Kou KI, Miao JF et al (2023) Quaternion scalar and vector norm decomposition: quaternion PCA for color face recognition. IEEE Trans Image Process 32:446–457

    Article  Google Scholar 

  • Lu CS, Liao HYM (2003) Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans Multimedia 5(2):161–173

    Article  Google Scholar 

  • Ma RR, Jia ZG, Bai ZJ (2018) A structure-preserving Jacobi algorithm for quaternion Hermitian eigenvalue problems. Comput Math Appl 75(3):809–820

    Article  MathSciNet  Google Scholar 

  • Mahto DK, Singh AK (2021) A survey of color image watermarking: state-of-the-art and research directions. Comput Electr Eng 93:107255

    Article  Google Scholar 

  • Pei SC, Cheng CM (1997) A novel block truncation coding of color images using a quaternion-moment-preserving principle. IEEE Trans Commun 45(5):583–595

    Article  Google Scholar 

  • Pei SC, Cheng CM (1999) Color image processing by using binary quaternion-moment-preserving thresholding technique. IEEE Trans Image Process 8(5):614–628

    Article  Google Scholar 

  • Qi LQ, Cui CF (2023) Eigenvalues and Jordan forms of dual complex matrices. arXiv:2306.12428

  • Qi LQ, Ling C, Yan H (2022) Dual quaternions and dual quaternion vectors. Commun Appl Math Comput 4:1494–1508

    Article  MathSciNet  Google Scholar 

  • Saad SM (2009) Design of a robust and secure digital signature scheme for image authentication over wireless channels. IET Inf Secur 3(1):1–8

    Article  Google Scholar 

  • Sangwine S, Le Bihan N (2005) Quaternion toolbox for Matlab. http://qtfm.sourceforge.net/

  • Singh M, Kaur H, Kakkar A (2016) Digital signature verification scheme for image authentication. In: International conference on recent advances in engineering and computational sciences. IEEE, pp 1–5

  • Sun YH, Su QT, Chen SY et al (2022) A double-color image watermarking algorithm based on quaternion Schur decomposition. Optik 269:169899

    Article  Google Scholar 

  • Zhang MC, Ding WX, Li Y et al (2023) Color image watermarking based on a fast structure-preserving algorithm of quaternion singular value decomposition. Signal Process 208:108971

    Article  Google Scholar 

Download references

Funding

This work is supported by the National Natural Science Foundation of China (62176112) and the Natural Science Foundation of Shandong Province (ZR2022MA030), and Discipline with Strong Characteristic of Liaocheng University Intelligent Science and Technology (319462208).

Author information

Authors and Affiliations

Authors

Contributions

Both the authors contributed equally to this work

Corresponding author

Correspondence to Ying Li.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Ethical approval

Not applicable.

Additional information

Communicated by Justin Wan.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ding, W., Xi, Y. & Li, Y. A novel strict color image authentication scheme based on dual-complex LU decomposition. Comp. Appl. Math. 43, 195 (2024). https://doi.org/10.1007/s40314-024-02665-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s40314-024-02665-y

Keywords

Mathematics Subject Classification

Navigation