Discrete Cosine Transformation based Image Authentication and Secret Message Transmission scheme

被引:2
|
作者
Bhattacharyya, Debnath [1 ]
Dutta, Jhuma [1 ]
Das, Poulami [1 ]
Bandyopadhyay, S. K. [2 ]
Kim, Tai-hoon [3 ]
机构
[1] Heritage Inst Technol, Dept Comp Sci & Engn, Kolkata 700107, India
[2] Univ Calcutta, Dept Comp Sci & Engn, Kolkata 700009, W Bengal, India
[3] Hannam Univ, Daejeon 306791, South Korea
关键词
D O I
10.1109/CICSYN.2009.11
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper a novel "Discrete Cosine Transformation based Image Authentication & Secret Message Transmission Scheme" (DCTIASMTT) has been proposed to authenticate a multimedia image and at the same time some ubiquitous secret message or image can be transmitted over the mobile network. Instead of direct embedding a message or image within the source image, choose a window of size 2x2 of the source image and then convert it from spatial domain to frequency domain using Discrete Cosine Transformation (DCT). The bits of the authenticating message or image are then embedded at LSB of the transformed image (excluding first pixel). Inverse DCT has been performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through reverse procedure. The experimental results have been discussed and compared with the existing steganographic algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with S-Tools.
引用
收藏
页码:374 / +
页数:2
相关论文
共 50 条
  • [21] Random Grid based Extended Visual Secret Sharing Scheme for Image Authentication
    Kukreja, Sonal
    Kasana, Singara Singh
    Kasana, Geeta
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 870 - 875
  • [22] Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
    Zhang, Lina
    Wang, Tong
    Zheng, Xiangqin
    Yang, Junhan
    Lv, Liping
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [23] Image encryption scheme based on alternate quantum walks and discrete cosine transform
    Ma, Yulin
    Li, Nachuan
    Zhang, Wenbin
    Wang, Shumei
    Ma, Hongyang
    OPTICS EXPRESS, 2021, 29 (18): : 28338 - 28351
  • [24] Discrete Cosine Transformation for image compression: A comparative study
    Zeng, Chong
    Chen, Jiali
    Chen, Xiaojie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2017), 2017, 74 : 952 - 954
  • [25] Multifocus image fusion scheme based on discrete cosine transform and spatial frequency
    Vakaimalar, E.
    Mala, K.
    Babu, Suresh R.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) : 17573 - 17587
  • [26] New Discrete Cosine Transformation Algorithm in Image Retrieval
    Yin, Dai
    Chen, Xiao-Wen
    Wang, Yu-Yi
    Zheng, Yun-Long
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON MECHATRONICS, ELECTRONIC, INDUSTRIAL AND CONTROL ENGINEERING, 2014, 5 : 428 - 431
  • [27] Multifocus image fusion scheme based on discrete cosine transform and spatial frequency
    Multimedia Tools and Applications, 2019, 78 : 17573 - 17587
  • [28] Quantum color image watermarking scheme based on quantum discrete cosine transform
    Li, Zhen-Zhen
    Li, Ya-Jing
    Zhang, Zhao
    Wang, Dong-Fei
    Wang, Jing-Tao
    PHYSICA SCRIPTA, 2024, 99 (11)
  • [29] Digital image watermarking using discrete cosine transformation based linear modulation
    Alomoush, Waleed
    Khashan, Osama A.
    Alrosan, Ayat
    Attar, Hani H.
    Almomani, Ammar
    Alhosban, Fuad
    Makhadmeh, Sharif Naser
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [30] IMAGE ENHANCEMENT METHOD FOR UNDERWATER IMAGES BASED ON DISCRETE COSINE EIGENBASIS TRANSFORMATION
    Baba, Tatsuya
    Nakamura, Keishu
    Kyochi, Seisuke
    Okuda, Masahiro
    2017 24TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2017, : 4272 - 4276