A Steganographic Scheme for Color Image Authentication Using Z-Transform (SSCIAZ)

被引:0
|
作者
Ghoshal, Nabin [1 ]
Chowdhury, Soumit [2 ]
Mandal, Jyotsna Kumar [3 ]
机构
[1] Univ Kalyani, Dept Engn & Technol Studies, Nadia 741235, W Bengal, India
[2] Govt Coll Engn & Ceram Technol, Dept Comp Sci & Engn, Kolkata 700010, India
[3] Univ Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper deals with a novel Steganographic technique which demonstrates the color image authentication in Z-domain based on the Discrete two dimensional Z-Transform. The Transform is applied on mask of sub-image block of size 2 x 2 of spatial components in row major order for the entire image. Single bit from the authenticating secret message/image is fabricated into the real part of the frequency component of each carrier image byte. A delicate re-adjust phase is incorporated in all components of each mask after embedding, to keep the pixel values positive and non-fractional in the spatial domain. Robustness is achieved through embedding bits in variable positions of carrier image determined by a cyclic Fibonacci series. Experimental results show the enhanced performance of the proposed watermarking technique.
引用
收藏
页码:209 / +
页数:2
相关论文
共 50 条
  • [1] Z-Transform Based Digital Image Watermarking Scheme with DWT and Chaos
    Jayashree, N.
    Bhuvaneswaran, R. S.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (ICACNI 2015), VOL 1, 2016, 43 : 289 - 297
  • [2] A Robust Image Watermarking Scheme Using Z-Transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition
    Jayashree, N.
    Bhuyaneswaran, R. S.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 58 (01): : 263 - 285
  • [3] ON USING THE CHIRP Z-TRANSFORM FOR RADAR IMAGE-FORMATION
    ADAMS, JW
    BAYMA, RW
    MILLIMETER WAVE AND SYNTHETIC APERTURE RADAR, 1989, 1101 : 19 - 22
  • [4] Efficient implementation of the image rotation method using chirp Z-transform
    Myagotin A.V.
    Vlasov E.V.
    Pattern Recognition and Image Analysis, 2014, 24 (1) : 57 - 62
  • [5] CHARACTERIZATION OF CALORIMETERS USING THE Z-TRANSFORM
    REY, C
    VILLAR, VP
    RODRIGUEZ, JR
    THERMOCHIMICA ACTA, 1985, 87 (MAY) : 297 - 302
  • [6] Authentication of NIfTI Neuroimages Using Lifting Wavelet Transform, Arnold Cat Map, Z-Transform, and Hessenberg Decomposition
    Singh, Kamred Udham
    Hsieh, Sun-Yuan
    Swarup, Chetan
    Singh, Teekam
    TRAITEMENT DU SIGNAL, 2022, 39 (01) : 265 - 274
  • [7] PROGRAM TERMINATION USING Z-TRANSFORM THEORY
    VENKATACHALAM, PA
    ARUMUGAM, S
    APPLIED MATHEMATICS AND COMPUTATION, 1988, 27 (03) : 231 - 241
  • [8] An Adaptive Watermarking Scheme Based on Nonsubsampled Contourlet Transform for Color Image Authentication
    Liu, Dongyan
    Liu, Wenbo
    Zhang, Gong
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 748 - 752
  • [9] A Fragile Watermarking Scheme for Image Authentication Using Wavelet Transform
    Azeroual, Assma
    Afdel, Karim
    IMAGE AND SIGNAL PROCESSING (ICISP 2016), 2016, 9680 : 337 - 345
  • [10] Stirling Transform based Color Image Authentication
    Ghosal, S. K.
    Mandal, J. K.
    FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 95 - 104