Authentication Technique for Gray Images Using DCT (ATGIDCT)

被引:0
作者
Goswami, Anirban [1 ]
Pal, Dipankar [1 ]
Ghoshal, Nabin
机构
[1] Techno India, Kolkata 700091, W Bengal, India
来源
2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT) | 2012年
关键词
Steganography; DCT; IDCT; MSE; PSNR; IF; WATERMARKING;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a novel steganographic technique based on Discrete Cosine Transform (DCT) for image authentication in frequency domain. The embedding algorithm applies DCT on a sub-image block called mask of size 2 x 2 of spatial components in row major order for the whole carrier image. Single bit of authenticating secret message/image is fabricated only in the real part of the frequency component of 2nd, 3rd and 4th carrier image bytes of each mask. The positions for embedding are pseudorandom in nature owing to a self derived hash function, which helps to improve the robustness of the technique. Also a minor re-adjustment is implemented only on the first component of each mask after embedding to keep the pixel values positive and non fractional in spatial domain. Experimental results prove statistically significantly enhanced performance of the proposed watermark technique.
引用
收藏
页码:421 / 424
页数:4
相关论文
共 18 条
[1]   A novel DCT-based approach for secure color image watermarking [J].
Ahmidi, N ;
Safabakhsh, R .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, :709-713
[2]  
Al-Hamami A. H., 2005, Journal of Computer Sciences, V1, P103, DOI 10.3844/jcssp.2005.103.106
[3]  
AMIN P, 2005, IEEE MULTIMEDIA SIGN, P1
[4]  
Bas P, 2003, 2003 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL III, PROCEEDINGS, P521
[5]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[6]  
Ghoshal N., 2008, Advances in Modelling & Analysis B: Signals, Information, Patterns, Data Acquisition, Transmission, Processing, Classification, V51, P1
[7]  
Ghoshal N, 2008, MALAYS J COMPUT SCI, V21, P24
[8]   Steganalysis of embedding in two least-significant bits [J].
Ker, Andrew D. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (01) :46-54
[9]   Reversible data hiding based on block median preservation [J].
Luo, Hao ;
Yu, Fa-Xin ;
Chen, Hua ;
Huang, Zheng-Liang ;
Li, Hui ;
Wang, Ping-Hui .
INFORMATION SCIENCES, 2011, 181 (02) :308-328
[10]   Information-theoretic analysis of information hiding [J].
Moulin, P ;
O'Sullivan, JA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (03) :563-593