Discrete Fourier Transformation based Image Authentication Technique

被引:7
|
作者
Bhattacharyya, Debnath [1 ]
Dutta, Jhuma [1 ]
Das, Poulami [1 ]
Bandyopadhyay, Rathit [2 ]
Bandyopadhyay, S. K. [3 ]
Kim, Tai-hoon [4 ]
机构
[1] Heritage Inst Technol, Dept Comp Sci & Engn, Kolkata, India
[2] Cognizant Technol, Kolkata, India
[3] Univ Calcutta, Kolkata, India
[4] Hannam Univ, Daejeon, South Korea
关键词
Authentication; Data Hiding; Discrete Fourier Transformation (DFT); Frequency Domain; Inverse Discrete Fourier Transform (IDFT); S-Tools;
D O I
10.1109/COGINF.2009.5250756
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper a novel technique, Discrete Fourier Transformation based Image Authentication (DFTIAT) has been proposed to authenticate an image and with its own application one can also transmit secret message or image over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner then convert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools.
引用
收藏
页码:196 / +
页数:4
相关论文
共 50 条
  • [41] Improve correlation matrix of Discrete Fourier Transformation technique for finding the missing values of MRI images
    Saeed, Soobia
    Haron, Habibollah
    Jhanjhi, N. Z.
    Naqvi, Mehmood
    Alhumyani, Hesham A.
    Masud, Mehedi
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (09) : 9039 - 9059
  • [42] FOURIER TRANSFORMATION OF RF DISCRETE SATURATION IN ESR
    SANADZE, TI
    JETP LETTERS, 1994, 59 (03) : 187 - 189
  • [43] Value combination technique for image authentication
    Zhang, Jie
    Liu, Fenlin
    Wang, Ping
    Wang, Guodong
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2007, 2007, 4810 : 276 - +
  • [44] STOCHASTIC PROPERTIES OF THE DISCRETE PARAMETRIC FOURIER TRANSFORMATION
    PONOMAREV, VA
    RADIOTEKHNIKA I ELEKTRONIKA, 1983, 28 (08): : 1590 - 1595
  • [45] Multiplication of Polynomials using Discrete Fourier Transformation
    Treyderowski, Krzysztof
    Schwarzweller, Christoph
    FORMALIZED MATHEMATICS, 2006, 14 (04): : 121 - 128
  • [46] Fourier transformation of rf discrete saturation in ESR
    Sanadze, T.I.
    JETP Letters (Translation of JETP Pis'ma v Redaktsiyu), 1994, 59 (03):
  • [47] Discrete Fourier Transformation of the large implementations of signals
    Kichak, V
    Bortnik, G
    Yblonskiy, V
    MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS, 2004, : 163 - 164
  • [48] A robust watermarking and image authentication technique
    Kung, CM
    Truong, K
    Jeng, JH
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 400 - 404
  • [49] Adaptive Image and Video Retargeting Technique Based on Fourier Analysis
    Kim, Jun-Seong
    Kim, Jin-Hwan
    Kim, Chang-Su
    CVPR: 2009 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOLS 1-4, 2009, : 1730 - 1737
  • [50] An image watermarking technique based on cascaded iterative Fourier transform
    Sang, Jun
    Zhang, Bing
    Hong, Daxiang
    Xiang, Hong
    Xu, Hongsheng
    Sang, Nong
    OPTIK, 2013, 124 (20): : 4522 - 4525