Discrete Cosine Transformation based Image Authentication and Secret Message Transmission scheme

被引:2
|
作者
Bhattacharyya, Debnath [1 ]
Dutta, Jhuma [1 ]
Das, Poulami [1 ]
Bandyopadhyay, S. K. [2 ]
Kim, Tai-hoon [3 ]
机构
[1] Heritage Inst Technol, Dept Comp Sci & Engn, Kolkata 700107, India
[2] Univ Calcutta, Dept Comp Sci & Engn, Kolkata 700009, W Bengal, India
[3] Hannam Univ, Daejeon 306791, South Korea
关键词
D O I
10.1109/CICSYN.2009.11
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper a novel "Discrete Cosine Transformation based Image Authentication & Secret Message Transmission Scheme" (DCTIASMTT) has been proposed to authenticate a multimedia image and at the same time some ubiquitous secret message or image can be transmitted over the mobile network. Instead of direct embedding a message or image within the source image, choose a window of size 2x2 of the source image and then convert it from spatial domain to frequency domain using Discrete Cosine Transformation (DCT). The bits of the authenticating message or image are then embedded at LSB of the transformed image (excluding first pixel). Inverse DCT has been performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through reverse procedure. The experimental results have been discussed and compared with the existing steganographic algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with S-Tools.
引用
收藏
页码:374 / +
页数:2
相关论文
共 50 条
  • [1] Inspecting lens collars for defects using discrete cosine transformation based on an image restoration scheme
    Chen, Ssu-Han
    IET IMAGE PROCESSING, 2016, 10 (06) : 474 - 482
  • [2] An image authentication scheme based on digital watermarking and image secret sharing
    Hsieh, Shang-Lin
    Tsai, I-Ju
    Yeh, Chung-Ping
    Chang, Chia-Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) : 597 - 619
  • [3] An image authentication scheme based on digital watermarking and image secret sharing
    Shang-Lin Hsieh
    I-Ju Tsai
    Chung-Ping Yeh
    Chia-Ming Chang
    Multimedia Tools and Applications, 2011, 52 : 597 - 619
  • [4] G-Let based Authentication/Secret Message Transmission (GASMT)
    Sengupta, Madhumita
    Mandal, J. K.
    Mathew, Jimson
    2013 INTERNATIONAL SYMPOSIUM ON ELECTRONIC SYSTEM DESIGN (ISED), 2013, : 186 - 190
  • [5] Image compression by discrete cosine transformation
    Belkhamza, NE
    Chekima, A
    Benblidia, N
    INTELLIGENT SYSTEMS IN DESIGN AND MANUFACTURING, 1998, 3517 : 200 - 207
  • [6] Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform
    Wu, Xiaotian
    Sun, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (04) : 1068 - 1088
  • [7] A grayscale image steganography based upon discrete cosine transformation
    Chang, Chin-Chen
    Lin, Pei-Yu
    Chuang, Jun-Chou
    Journal of Digital Information Management, 2010, 8 (02): : 88 - 94
  • [8] Discrete Fourier Transformation based Image Authentication Technique
    Bhattacharyya, Debnath
    Dutta, Jhuma
    Das, Poulami
    Bandyopadhyay, Rathit
    Bandyopadhyay, S. K.
    Kim, Tai-hoon
    PROCEEDINGS OF THE 8TH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, 2009, : 196 - +
  • [9] Discrete Cosine Transformation based Image Data Compression Considering Image Restoration
    Arai, Kohei
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (06) : 125 - 131
  • [10] Study of Discrete Cosine Transformation in Image Compression
    Zeng, Chong
    INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2014 (ICCMSE 2014), 2014, 1618 : 501 - 503