Discrete Fourier Transformation based Image Authentication Technique

被引:7
|
作者
Bhattacharyya, Debnath [1 ]
Dutta, Jhuma [1 ]
Das, Poulami [1 ]
Bandyopadhyay, Rathit [2 ]
Bandyopadhyay, S. K. [3 ]
Kim, Tai-hoon [4 ]
机构
[1] Heritage Inst Technol, Dept Comp Sci & Engn, Kolkata, India
[2] Cognizant Technol, Kolkata, India
[3] Univ Calcutta, Kolkata, India
[4] Hannam Univ, Daejeon, South Korea
关键词
Authentication; Data Hiding; Discrete Fourier Transformation (DFT); Frequency Domain; Inverse Discrete Fourier Transform (IDFT); S-Tools;
D O I
10.1109/COGINF.2009.5250756
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper a novel technique, Discrete Fourier Transformation based Image Authentication (DFTIAT) has been proposed to authenticate an image and with its own application one can also transmit secret message or image over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner then convert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools.
引用
收藏
页码:196 / +
页数:4
相关论文
共 50 条
  • [1] A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT)
    Ghoshal, Nabin
    Mandal, Jyotsna Kumar
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2008, 21 (01) : 24 - 32
  • [2] An Image Authentication Based on Discrete Fourier Transform
    The Duc Kieu
    Chang, Chin-Chen
    FUNDAMENTA INFORMATICAE, 2009, 97 (04) : 369 - 379
  • [3] Image Data Hiding Technique Using Discrete Fourier Transformation
    Bhattacharyya, Debnath
    Kim, Tai-hoon
    UBIQUITOUS COMPUTING AND MULTIMEDIA APPLICATIONS, PT II, 2011, 151 : 315 - +
  • [4] Secure blind image steganographic technique using discrete Fourier transformation
    Alturki, F
    Mersereau, R
    2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2001, : 542 - 545
  • [5] Discrete Cosine Transformation based Image Authentication and Secret Message Transmission scheme
    Bhattacharyya, Debnath
    Dutta, Jhuma
    Das, Poulami
    Bandyopadhyay, S. K.
    Kim, Tai-hoon
    2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 374 - +
  • [6] A Fractional Fourier Based Medical Image Authentication Approach
    Alqahtani, Fayez
    Amoon, Mohammed
    El-Shafai, Walid
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 3133 - 3150
  • [7] Quadtrees-based image authentication technique
    Wang, HX
    He, C
    Ding, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (04) : 946 - 948
  • [8] On the protection and authentication of digital image based on wavelet transformation
    Wang, LY
    Chen, PC
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 148 - 151
  • [9] The discrete fractional Fourier transformation
    Arikan, O
    Kutay, MA
    Ozaktas, HM
    Akdemir, OK
    PROCEEDINGS OF THE IEEE-SP INTERNATIONAL SYMPOSIUM ON TIME-FREQUENCY AND TIME-SCALE ANALYSIS, 1996, : 205 - 207
  • [10] RECURSIVE DISCRETE FOURIER TRANSFORMATION
    HOSTETTER, GH
    IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1980, 28 (02): : 184 - 190