{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:13:36Z","timestamp":1760242416018,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T00:00:00Z","timestamp":1502409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Imaging"],"abstract":"<jats:p>In this paper, we apply the quaternion framework for color images to a fragile watermarking algorithm with the objective of multimedia integrity protection (Quaternion Karhunen-Lo\u00e8ve Transform Fragile Watermarking (QKLT-FW)). The use of quaternions to represent pixels allows to consider the color information in a holistic and integrated fashion. We stress out that, by taking advantage of the host image quaternion representation, we extract complex features that are able to improve the embedding and verification of fragile watermarks. The algorithm, based on the Quaternion Karhunen-Lo\u00e8ve Transform (QKLT), embeds a binary watermark into some QKLT coefficients representing a host image in a secret frequency space: the QKLT basis images are computed from a secret color image used as a symmetric key. A computational intelligence technique (i.e., genetic algorithm) is employed to modify the host image pixels in such a way that the watermark is contained in the protected image. The sensitivity to image modifications is then tested, showing very good performance.<\/jats:p>","DOI":"10.3390\/jimaging3030034","type":"journal-article","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T10:07:40Z","timestamp":1502446060000},"page":"34","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Image Fragile Watermarking through Quaternion Linear Transform in Secret Space"],"prefix":"10.3390","volume":"3","author":[{"given":"Marco","family":"Botta","sequence":"first","affiliation":[{"name":"Dipartimento di Informatica, Universit\u00e0 degli Studi di Torino, 10149 Turin, Italy"}]},{"given":"Davide","family":"Cavagnino","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Universit\u00e0 degli Studi di Torino, 10149 Turin, Italy"}]},{"given":"Victor","family":"Pomponiu","sequence":"additional","affiliation":[{"name":"Agency for Science, Technology and Research, 1 Fusionopolis Way, 487372 Singapore, Singapore"}]}],"member":"1968","published-online":{"date-parts":[[2017,8,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., and Kalker, T. (2008). Digital Watermarking and Steganography, Morgan Kaufmann Publishers Inc.. [2nd ed.].","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1007\/s00500-014-1373-y","article-title":"Fragile Watermarking using Karhunen-Lo\u00e8ve transform: The KLT-F approach","volume":"19","author":"Botta","year":"2015","journal-title":"Soft Comput."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2806","DOI":"10.1016\/j.optcom.2009.04.034","article-title":"Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms","volume":"282","author":"Aslantas","year":"2009","journal-title":"Opt. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.sigpro.2015.07.018","article-title":"A Modular Framework for Color Image Watermarking","volume":"119","author":"Botta","year":"2016","journal-title":"Signal Process."},{"key":"ref_5","unstructured":"Le Bihan, N., and Sangwine, S.J. (2013, January 14\u201317). Quaternion principal component analysis of color images. Proceedings of the 2003 International Conference on Image Processing, Barcelona, Spain."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1979","DOI":"10.1049\/el:19961331","article-title":"Fourier transforms of colour images using quaternion, or hypercomplex numbers","volume":"32","author":"Sangwine","year":"1996","journal-title":"Electron. Lett."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/TIP.2006.884955","article-title":"Hypercomplex Fourier transforms of color images","volume":"16","author":"Ell","year":"2007","journal-title":"IEEE Trans. Image Process."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1016\/j.sigpro.2004.04.001","article-title":"Singular value decomposition of quaternion matrices: A new tool for vector-sensor signal processing","volume":"84","author":"Mars","year":"2004","journal-title":"Signal Process."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.jvcir.2009.10.002","article-title":"Geometric algebra colour image representations and derived total orderings for morphological operators\u2014Part I: Colour quaternions","volume":"21","author":"Angulo","year":"2010","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_10","unstructured":"Bas, P., Le Bihan, N., and Chassery, J.-M. (2003, January 6\u201310). Color image watermarking using quaternion Fourier transform. Proceedings of the 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, Hong Kong, China."},{"key":"ref_11","unstructured":"Sangwine, S.J., and Ell, T.A. (2001, January 7\u201310). Hypercomplex Fourier transforms of color images. Proceedings of the ICIP, Thessaloniki, Greece."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.jss.2012.08.015","article-title":"A robust blind color image watermarking in quaternion Fourier transform domain","volume":"86","author":"Wang","year":"2013","journal-title":"J. Syst. Softw."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"An, M., Wang, W., and Zhao, Z. (2013, January 26). Digital watermarking algorithm research of color images based on quaternion Fourier transform. Proceedings of the SPIE 8917: Multispectral Image Acquisition, Processing, and Analysis, Wuhan, China.","DOI":"10.1117\/12.2030754"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/TIFS.2007.916275","article-title":"Color Image Watermarking Using Multidimensional Fourier Transforms","volume":"3","author":"Tsui","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.dsp.2014.02.010","article-title":"Full 4-D quaternion discrete Fourier transform based watermarking for color images","volume":"28","author":"Chen","year":"2014","journal-title":"Digit. Signal Process."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.optcom.2015.01.002","article-title":"Combining double random phase encoding for color image watermarking in quaternion gyrator domain","volume":"343","author":"Shao","year":"2015","journal-title":"Opt. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Shao, Z., Wu, J., Coatrieux, J.L., Coatrieux, G., and Shu, H. (2013, January 15\u201318). Quaternion gyrator transform and its application to color image encryption. Proceedings of the ICIP, Melbourne, Australia.","DOI":"10.1109\/ICIP.2013.6738943"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.image.2014.12.009","article-title":"Image watermarking using polar harmonic transform with parameters in SL(2,R)","volume":"31","author":"Qi","year":"2015","journal-title":"Signal Process. Image Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"40:1","DOI":"10.1145\/2700299","article-title":"Robust Color Image Watermarking Using Geometric Invariant Quaternion Polar Harmonic Transform","volume":"11","author":"Yang","year":"2015","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"083103","DOI":"10.1117\/1.OE.55.8.083103","article-title":"Color image authentication using a zone-corrected error-monitoring quantization-based watermarking technique","volume":"55","year":"2016","journal-title":"Opt. Eng."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Akansu, A.N., and Haddad, R.A. (1992). Multiresolution Signal Decomposition: Transforms, Subbands, and Wavelets, Academic Press.","DOI":"10.1016\/B978-0-12-047140-9.50007-X"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"043008","DOI":"10.1117\/1.3500799","article-title":"Authentication and recovery of an image by sharing and lattice-embedding","volume":"19","author":"Lin","year":"2010","journal-title":"J. Electron. Imaging"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"033003","DOI":"10.1117\/1.JEI.23.3.033003","article-title":"Probability-based image authentication scheme for indexed color images","volume":"23","author":"Lo","year":"2014","journal-title":"J. Electron. Imaging"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"033012","DOI":"10.1117\/1.JEI.22.3.033012","article-title":"Authentication and recovery of images using standard deviation","volume":"22","author":"Wang","year":"2013","journal-title":"J. Electron. Imaging"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/TIP.2002.1014990","article-title":"Hierarchical watermarking for secure image authentication with localization","volume":"11","author":"Celik","year":"2002","journal-title":"IEEE Trans. Image Process."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Vince, J. (2011). Quaternions for Computer Graphics, Springer.","DOI":"10.1007\/978-0-85729-760-0"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/0024-3795(95)00543-9","article-title":"Quaternions and matrices of quaternions","volume":"251","author":"Zhang","year":"1997","journal-title":"Linear Algebra Its Appl."},{"key":"ref_28","unstructured":"Pei, S.-C., and Cheng, C.-M. (1996, January 23\u201326). A novel block truncation coding of color images by using quaternion-moment preserving principle. Proceedings of the IEEE International Symposium on Circuits and Systems, Atlanta, GA, USA."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: From error visibility to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Trans. Image Process."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1068\/p5321","article-title":"A biologically inspired algorithm for the recovery of shading and reflectance images","volume":"33","author":"Olmos","year":"2004","journal-title":"Perception"},{"key":"ref_31","unstructured":"(2014, December 18). Fred Kingdom\u2019s Laboratory, McGill Vision Research. Available online: http:\/\/tabby.vision.mcgill.ca\/."}],"container-title":["Journal of Imaging"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2313-433X\/3\/3\/34\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:42:10Z","timestamp":1760208130000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2313-433X\/3\/3\/34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,11]]},"references-count":31,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,9]]}},"alternative-id":["jimaging3030034"],"URL":"https:\/\/doi.org\/10.3390\/jimaging3030034","relation":{},"ISSN":["2313-433X"],"issn-type":[{"type":"electronic","value":"2313-433X"}],"subject":[],"published":{"date-parts":[[2017,8,11]]}}}