Wavelet Based Authentication/Secret Transmission Through Image Resizing(WASTIR)

نویسندگان

  • Madhumita Sengupta
  • J. K. Mandal
چکیده

The paper is aimed for a wavelet based steganographic/watermarking technique in frequency domain termed as WASTIR for secret message/image transmission or image authentication. Number system conversion of the secret image by changing radix form decimal to quaternary is the pre-processing of the technique. Cover image scaling through inverse discrete wavelet transformation with false Horizontal and vertical coefficients are embedded with quaternary digits through hash function and a secret key. Experimental results are computed and compared with the existing steganographic techniques like WTSIC, Yuancheng Li’s Method and Region-Based in terms of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) which show better performances in WASTIR.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

, and Akwinder Kaur Secret Image Sharing Scheme with Steganography and Authentication Based on Discrete Wavelet Transform

Secret image sharing is a technique to protect the sensitive data. Secret image sharing combined with steganography and transform domain improves authentication ability. The primary objective of the paper is to design a novel algorithm for hiding the secret data in the transform domain. The underlying concept is based on the discrete wavelet transform. A technique comprising of Haar filter and ...

متن کامل

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

Singular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images

In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...

متن کامل

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

A Secure Steganography Method Based on Integer Lifting Wavelet Transform

Steganography plays an important role in secret communication in digital worlds and open environments like Internet. Undetectability and imperceptibility of confidential data are major challenges of steganography methods. This article presents a secure steganography method in frequency domain based on partitioning approach. The cover image is partitioned into 8×8 blocks and then integer wavelet...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1305.3753  شماره 

صفحات  -

تاریخ انتشار 2013