Authentication through Hough transformation generated Signature on G-Let D3 Domain (AHSG)

被引:4
作者
Sengupta, Madhumita [1 ]
Mandal, J. K. [1 ]
机构
[1] Univ Kalyani, Dept Comp Sci & Engn, Nadia 741235, W Bengal, India
来源
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013 | 2013年 / 10卷
关键词
Authentication; Steganography; G-Lets; Hough transform; Peak Signal to Noise Ratio (PSNR);
D O I
10.1016/j.protcy.2013.12.344
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper a G-Let based authentication technique has been proposed to authenticate digital documents through Hough transform generated signature generated from original autograph. The cover image is transformed into G-Let domain to generate n number of G-Lets out of which (n/2)-1 numbers of G-Lets are embedded with secret Hough signature bits for the purpose of authentication or copyright protection. The special feature of AHSG is to optimize the distortion rate, by adjustment at the last stage of the technique, using back propagation. Experimental results are computed and compared with the existing authentication techniques like Li's method, SCDFT, Region-Based method based on Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Image Fidelity (IF), Universal Quality Image (UQI) and Structural Similarity Index Measurement (SSIM) which shows better performance in AHSG, in terms of low computational complexity and better fidelity. (C) 2013 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:121 / 130
页数:10
相关论文
共 16 条
[1]  
Ghoshal N, 2008, MALAYS J COMPUT SCI, V21, P24
[2]  
Hough P.V. C., 1962, US Patent, Patent No. [3,069,654, 3069054]
[3]  
KUTTER M, 1999, ELECT IMAGING 99 SEC, V3657
[4]  
Leavers V.F., 1992, SHAPE DETECTION COMP, DOI [10.1017/S0263574700016210, DOI 10.1017/S0263574700016210]
[5]  
Li Yuancheng, 2008, IEEE P 7 WORLD C INT
[6]  
Mandal J. K., 2011, Proceedings of the Second International Conference on Emerging Applications of Information Technology (EAIT 2011), P298, DOI 10.1109/EAIT.2011.24
[7]  
Mandal J. K., 2010, Proceedings of the 2010 International Symposium on Electronic System Design (ISED 2010), P225, DOI 10.1109/ISED.2010.50
[8]   Region-based image watermarking [J].
Nikolaidis, A ;
Pitas, I .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (11) :1726-1740
[9]  
Rajathilagam B., 2011, IEEE T IMAG PROC
[10]  
Rajathilagam B., 2012, INT J COMPUTER APPL, V37, DOI [10.5120/4609-6591, DOI 10.5120/4609-6591]