{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:09:12Z","timestamp":1760609352083,"version":"build-2065373602"},"reference-count":46,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T00:00:00Z","timestamp":1615161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/50022\/2020","UIDB\/50014\/2020","POCI-01-0145-FEDER-032460 \u2013 GRIS"],"award-info":[{"award-number":["UIDB\/50022\/2020","UIDB\/50014\/2020","POCI-01-0145-FEDER-032460 \u2013 GRIS"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["POCI-01-0145-FEDER-032460 \u2013 GRIS"],"award-info":[{"award-number":["POCI-01-0145-FEDER-032460 \u2013 GRIS"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Imaging"],"abstract":"<jats:p>Cork stoppers were shown to have unique characteristics that allow their use for authentication purposes in an anti-counterfeiting effort. This authentication process relies on the comparison between a user\u2019s cork image and all registered cork images in the database of genuine items. With the growth of the database, this one-to-many comparison method becomes lengthier and therefore usefulness decreases. To tackle this problem, the present work designs and compares hashing-assisted image matching methods that can be used in cork stopper authentication. The analyzed approaches are the discrete cosine transform, wavelet transform, Radon transform, and other methods such as difference hash and average hash. The most successful approach uses a 1024-bit hash length and difference hash method providing a 98% accuracy rate. By transforming the image matching into a hash matching problem, the approach presented becomes almost 40 times faster when compared to the literature.<\/jats:p>","DOI":"10.3390\/jimaging7030048","type":"journal-article","created":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T12:12:18Z","timestamp":1615205538000},"page":"48","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Design and Comparison of Image Hashing Methods: A Case Study on Cork Stopper Unique Identification"],"prefix":"10.3390","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5137-2451","authenticated-orcid":false,"given":"Ricardo","family":"Fitas","sequence":"first","affiliation":[{"name":"Department of Mechanical Engineering, FEUP\u2014Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1529-2101","authenticated-orcid":false,"given":"Bernardo","family":"Rocha","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering, FEUP\u2014Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4769-8843","authenticated-orcid":false,"given":"Valter","family":"Costa","sequence":"additional","affiliation":[{"name":"INEGI\u2014Institute of Science and Innovation in Mechanical and Industrial Engineering, 4200-465 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0317-4714","authenticated-orcid":false,"given":"Armando","family":"Sousa","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, FEUP\u2014Faculty of Engineering, University of Porto, 4200-465 Porto, Portugal"},{"name":"INESC TEC\u2014INESC Technology and Science (formerly INESC Porto), 4200-465 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2021,3,8]]},"reference":[{"key":"ref_1","first-page":"1","article-title":"Individual recognition based on the fingerprint of things expands the applications of IoT","volume":"11","author":"Ishiyama","year":"2016","journal-title":"NEC Tech. J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"4738","DOI":"10.1038\/s41598-018-22876-8","article-title":"Using unique surface patterns of injection moulded plastic components as an image based Physical Unclonable Function for secure component identification","volume":"8","author":"Wigger","year":"2018","journal-title":"Sci. Rep."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ishiyama, R., Kudo, Y., Takahashi, T., Kooper, M., Makino, K., Abbink, D., and Nl, D. (2019, January 13\u201315). Medicine Tablet Authentication Using \u201cFingerprints\u201d of Ink-Jet Printed Characters. Proceedings of the 2019 IEEE International Conference on Industrial Technology (ICIT), Melbourne, VIC, Australia.","DOI":"10.1109\/ICIT.2019.8754966"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Al-alem, F., Alsmirat, M.A., and Al-Ayyoub, M. (December, January 29). On the road to the Internet of Biometric Things: A survey of fingerprint acquisition technologies and fingerprint databases. Proceedings of the 2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco.","DOI":"10.1109\/AICCSA.2016.7945810"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.1109\/JIOT.2016.2558659","article-title":"CSI Phase Fingerprinting for Indoor Localization With a Deep Learning Approach","volume":"3","author":"Wang","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_6","unstructured":"WHO (2017). Global Surveillance and Monitoring System for Substandard and Falsified Medical Products, World Health Organization."},{"key":"ref_7","first-page":"2017","article-title":"Fighting counterfeit pharmaceuticals: New defenses for an underestimated and growing menace","volume":"12","author":"Behner","year":"2017","journal-title":"Retrieved Dec."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","article-title":"RFID security and privacy: A research survey","volume":"24","author":"Juels","year":"2006","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Chen, C.H., Lin, I.C., and Yang, C.C. (2014, January 2\u20134). NFC Attacks Analysis and Survey. Proceedings of the 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Birmingham, UK.","DOI":"10.1109\/IMIS.2014.66"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Costa, V., Sousa, A., and Reis, A. (2018). Cork as a Unique Object: Device, Method, and Evaluation. Appl. Sci., 8.","DOI":"10.3390\/app8112150"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Devadas, S., and Koushanfar, F. (2012). Security Based on Physical Unclonability and Disorder. Introduction to Hardware Security and Trust, Springer.","DOI":"10.1007\/978-1-4419-8080-9_4"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical one-way functions","volume":"297","author":"Pappu","year":"2002","journal-title":"Science"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., and Holcomb, D.E. (2014, January 24\u201328). PUFs at a glance. Proceedings of the 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany.","DOI":"10.7873\/DATE.2014.360"},{"key":"ref_14","unstructured":"Rogaway, P. (2011). Physically Uncloneable Functions in the Universal Composition Framework BT\u2014Advances in Cryptology\u2014CRYPTO 2011, Springer."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Costa, V., Sousa, A., and Reis, A. (2018). Preventing wine counterfeiting by individual cork stopper recognition using image processing technologies. J. Imaging, 4.","DOI":"10.3390\/jimaging4040054"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.ijar.2007.06.008","article-title":"An image coding\/decoding method based on direct and inverse fuzzy transforms","volume":"48","author":"Loia","year":"2008","journal-title":"Int. J. Approx. Reason."},{"key":"ref_17","first-page":"515","article-title":"Analysis of Image Compression Algorithm Using DCT","volume":"2","author":"Gupta","year":"2012","journal-title":"Int. J. Eng. Res. Appl."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ito, I. (2020). A New Pseudo-Spectral Method Using the Discrete Cosine Transform. J. Imaging, 6.","DOI":"10.3390\/jimaging6040015"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1109\/TNN.2003.813842","article-title":"Combining support vector machine learning with the discrete cosine transform in image compression","volume":"14","author":"Robinson","year":"2003","journal-title":"IEEE Trans. Neural Netw."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ridder, D., and Duin, R. (2003). Locally Linear Embedding For Classification. Artificial Neural Networks and Neural Information Processing\u2014ICANN\/ICONIP 2003, Springer.","DOI":"10.1007\/3-540-44989-2_40"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.cose.2016.07.006","article-title":"Robust image hashing via DCT and LLE","volume":"62","author":"Tang","year":"2016","journal-title":"Comput. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Xizhi, Z. (2008, January 30\u201331). The Application of Wavelet Transform in Digital Image Processing. Proceedings of the 2008 International Conference on MultiMedia and Information Technology, Three Gorges, China.","DOI":"10.1109\/MMIT.2008.134"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"7925404","DOI":"10.1155\/2017\/7925404","article-title":"The Discrete Wavelet Transform and Its Application for Noise Removal in Localized Corrosion Measurements","volume":"2017","author":"Ramos","year":"2017","journal-title":"Int. J. Corros."},{"key":"ref_24","unstructured":"Bovik, A. (2009). Chapter 18\u2014Wavelet Image Compression. The Essential Guide to Image Processing, Academic Press."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Kehtarnavaz, N. (2008). Chapter 7\u2014Frequency Domain Processing. Digital Signal Processing System Design, Academic Press. [2nd ed.].","DOI":"10.1016\/B978-0-12-374490-6.00007-6"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s10015-010-0827-2","article-title":"Radon transform for face recognition","volume":"15","author":"Dargham","year":"2010","journal-title":"Artif. Life Robot."},{"key":"ref_27","unstructured":"Beatty, J. (2014). The Radon Transform and Medical Imaging, SIAM."},{"key":"ref_28","unstructured":"Lefbvre, F., Macq, B., and Legat, J.-D. (2002, January 3\u20136). Rash: Radon soft hash algorithm. Proceedings of the 2002 11th European Signal Processing Conference, Toulouse, France."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ou, Y., and Rhee, K.H. (2009, January 7\u20139). A key-dependent secure image hashing scheme by using Radon transform. Proceedings of the 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Kanazawa, Japan.","DOI":"10.1109\/ISPACS.2009.5383770"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1350008","DOI":"10.1142\/S0218001413500080","article-title":"DTW-radon-based shape descriptor for pattern recognition","volume":"27","author":"Santosh","year":"2013","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"ref_31","unstructured":"Van Ginkel, M., Luengo Hendriks, C., and Van Vliet, L. (2004). A Short Introduction to the Radon and Hough Transforms and How They Relate to Each Other, Delft University of Technology."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Bailey, D., Chang, Y., and Le Moan, S. (2020). Analysing Arbitrary Curves from the Line Hough Transform. J. Imaging, 6.","DOI":"10.3390\/jimaging6040026"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"115713","DOI":"10.1016\/j.image.2019.115713","article-title":"Perceptual hashing for image authentication: A survey","volume":"81","author":"Du","year":"2020","journal-title":"Signal Process. Image Commun."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2144","DOI":"10.1109\/TIFS.2017.2699942","article-title":"Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing","volume":"12","author":"Yan","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"45460","DOI":"10.1109\/ACCESS.2019.2908029","article-title":"Perceptual Image Hashing Based on Weber Local Binary Pattern and Color Angle Representation","volume":"7","author":"Qin","year":"2019","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.sigpro.2017.07.019","article-title":"Perceptual hashing for color images based on hybrid extraction of structural features","volume":"142","author":"Qin","year":"2018","journal-title":"Signal Process."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"11609","DOI":"10.1007\/s11042-017-4809-4","article-title":"Robust image hashing using progressive feature selection for tampering detection","volume":"77","author":"Pun","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1651","DOI":"10.1007\/s11042-012-1188-8","article-title":"Secure and robust image hashing via compressive sensing","volume":"70","author":"Sun","year":"2014","journal-title":"Multimed. Tools Appl."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"7681","DOI":"10.1007\/s11042-015-2688-0","article-title":"Robust image hashing with tampering recovery capability via low-rank and sparse representation","volume":"75","author":"Liu","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Srivastava, M., Siddiqui, J., and Ali, M.A. (2016, January 9\u201311). Robust image hashing based on statistical features for copy detection. Proceedings of the 2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON), Varanasi, India.","DOI":"10.1109\/UPCON.2016.7894703"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Huang, Z., and Liu, S. (2018, January 22\u201326). Robustness and Discrimination Oriented Hashing Combining Texture and Invariant Vector Distance. Proceedings of the 26th ACM International Conference on Multimedia, Seoul, Korea.","DOI":"10.1145\/3240508.3240690"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"043055","DOI":"10.1117\/1.JEI.27.4.043055","article-title":"Perceptual image hashing based on a deep convolution neural network for content authentication","volume":"27","author":"Jiang","year":"2018","journal-title":"J. Electron. Imaging"},{"key":"ref_43","unstructured":"Costa, V. (2021, March 05). Vision Methods to Find Uniqueness Within a Class of Objects [University of Porto]. Available online: https:\/\/hdl.handle.net\/10216\/119624."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Costa, V., Sousa, A., and Reis, A. (2018, January 13\u201316). CBIR for a wine anti-counterfeiting system using imagery from cork stoppers. Proceedings of the 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), C\u00e1ceres, Spain.","DOI":"10.23919\/CISTI.2018.8399225"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1109\/TPAMI.2005.126","article-title":"Radon transform orientation estimation for rotation invariant texture analysis","volume":"27","year":"2005","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Hejazi, M.R., Shevlyakov, G., and Ho, Y. (2006, January 3\u20136). Modified Discrete Radon Transforms and Their Application to Rotation-Invariant Image Analysis. Proceedings of the 2006 IEEE Workshop on Multimedia Signal Processing, Victoria, BC, Canada.","DOI":"10.1109\/MMSP.2006.285345"}],"container-title":["Journal of Imaging"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2313-433X\/7\/3\/48\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:34:43Z","timestamp":1760160883000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2313-433X\/7\/3\/48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,8]]},"references-count":46,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,3]]}},"alternative-id":["jimaging7030048"],"URL":"https:\/\/doi.org\/10.3390\/jimaging7030048","relation":{},"ISSN":["2313-433X"],"issn-type":[{"type":"electronic","value":"2313-433X"}],"subject":[],"published":{"date-parts":[[2021,3,8]]}}}