DFT based Hiding Technique for Colour Image Authentication (DFTHTCIA)

نویسندگان

  • Nabin Ghoshal
  • J. K. Mandal
چکیده

In this paper a novel data hiding technique in frequency domain has been proposed using Discrete Fourier Transform (DFT) for colour image authentication and secret message transmission. Image authentication is done by embedding message/image in frequency domain by choosing image blocks of size 2 × 2, called mask, from the source image in row major order and transform it into the frequency domain using DFT. Here three algorithms are developed for embedding secret data into the source image. In the 1 algorithm two bits of authenticating message/image/message-digest are fabricated within the real parts of each source image byte except first frequency component of each mask and in 2 and 3 algorithm three and four bits of authenticating or secrete data are embedded respectively. In all the proposed techniques the dimension of authenticating image followed by message digest (MD) and the content of authenticating message/image are embedded. Inverse DFT (IDFT) is performed on embedded data to transform embedded frequency component to spatial component. In order to keep the quantum value positive and non negative in spatial domain a strong and robust technique is incorporated mainly on the first frequency component and sometimes on other component depends upon situations. The decoding is done by applying the reverse algorithm. Experimental results conform that the proposed algorithm performs better than DCT, QFT and SCDFT schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT)

In this paper a novel data embedding technique in frequency domain has been proposed using Discrete Fourier Transform (DFT) for image authentication and secured message transmission based on hiding a large volume of data into gray images. Image authentication is done by embedding message/image in frequency domain by choosing image blocks of size 2 × 2, called mask, from the source image in row ...

متن کامل

A Survey of Information Hiding Schemes for Digital Images

In this survey, we first describe the purposes for image hiding. They are Steganography, Image Watermarking and Image Authentication. Classified by hiding methods, image hiding can be divided into pixel-based image hiding, frequency-based image hiding and VQ-based image hiding. In the aspect of pixel-based image hiding, we describe three representative methods, the substitution table technique,...

متن کامل

Transform Based Digital Image Watermarking Techniques for Image Authentication

In the past few years many new techniques and concepts based on data hiding have been introduced for image authentication and copy right protection. With a lot of information available on various search engines, to protect the ownership of information is a crucial area of research. Digital watermarking is a popular technique that is used for copyright protection and authentication. Digital wate...

متن کامل

Data Hiding Based on Spatial Domain Concept(R, G, B Planes & Gray images)

Data hiding is the technique of embedding data in an image and retrieval of the data with lossless reconstruction of original im age. In this paper, we present data hiding scheme based on histogram modification.This technique is based on differences of adjacent pixels for embedding data and has more hiding capacity compared to existing methods.We exploit a binary tree structure to solve the pro...

متن کامل

Efficient Reversible Data Hiding Techniques Based on RDH Algorithm for Multimedia Communication

In the paper, we deal with the system that hides the data reversibly which is termed as reversible data hiding scheme. In this technique images will be authenticated and then the authenticate image is restored to their original from. This original form is achieved by removing the digital watermark and it replaces the image data that had been overwritten. The main aim of hiding is to maintain se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011