Discrete Fourier Transformation based Image Authentication Technique

被引:7
|
作者
Bhattacharyya, Debnath [1 ]
Dutta, Jhuma [1 ]
Das, Poulami [1 ]
Bandyopadhyay, Rathit [2 ]
Bandyopadhyay, S. K. [3 ]
Kim, Tai-hoon [4 ]
机构
[1] Heritage Inst Technol, Dept Comp Sci & Engn, Kolkata, India
[2] Cognizant Technol, Kolkata, India
[3] Univ Calcutta, Kolkata, India
[4] Hannam Univ, Daejeon, South Korea
关键词
Authentication; Data Hiding; Discrete Fourier Transformation (DFT); Frequency Domain; Inverse Discrete Fourier Transform (IDFT); S-Tools;
D O I
10.1109/COGINF.2009.5250756
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper a novel technique, Discrete Fourier Transformation based Image Authentication (DFTIAT) has been proposed to authenticate an image and with its own application one can also transmit secret message or image over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner then convert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools.
引用
收藏
页码:196 / +
页数:4
相关论文
共 50 条
  • [31] Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform
    Ouyang, Junlin
    Coatrieux, Gouenou
    Shu, Huazhong
    DIGITAL SIGNAL PROCESSING, 2015, 41 : 98 - 109
  • [32] Masking based Data Hiding and Image Authentication Technique (MDHIAT)
    Ghoshal, Nabin
    Sarkar, A.
    Chakraborty, D.
    Ghosh, S.
    Mandal, J. K.
    ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 119 - +
  • [33] Nonlinear Fourier Transformation Based Coherent Detection Scheme for Discrete Spectrum
    Buelow, Henning
    2015 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXHIBITION (OFC), 2015,
  • [34] A Digital Watermarking based on Discrete Fractional Fourier Transformation DWT and SVD
    Chen, Yongchang
    Yu, Weiyu
    Feng, JiuChao
    PROCEEDINGS OF THE 2012 24TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2012, : 1383 - 1386
  • [35] Robust Image Hashing Technique for Content Authentication based on DWT
    Vadlamudi, Lokanadham Naidu
    Vaddella, Rama Prasad V.
    Devara, Vasumathi
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2016, VOL 1, 2017, 459 : 181 - 191
  • [36] An Image Based Authentication Technique Using Visual Cryptography Scheme
    Dais, Annie, V
    Joe, Vijesh C.
    Sugi, Sidney Swarna S.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 124 - 129
  • [37] Colour image authentication based on a self-embedding technique
    Kostopoulos, I
    Gilani, SAM
    Skodras, AN
    DSP 2002: 14TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING PROCEEDINGS, VOLS 1 AND 2, 2002, : 733 - 736
  • [38] Photonic Fractional Fourier Transformation Based on Discrete-Frequency Processing
    Xie, Xiangzhi
    Guan, Shanhong
    Li, Jilong
    Yin, Feifei
    Xu, Kun
    Dai, Yitang
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2022, 40 (20) : 6875 - 6881
  • [39] Image Watermarking Based on Discrete Fractional Fourier Transforms With Multiple Parameters
    Chiu, Wei-Ting
    Tai, Yu
    Hsue, Wen-Liang
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017, : 2687 - 2693
  • [40] Discrete Cosine Transformation based Image Data Compression Considering Image Restoration
    Arai, Kohei
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (06) : 125 - 131