Proceedings ArticleDOI
Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme
Debnath Bhattacharyya,Jhuma Dutta,Poulami Das,Samir Kumar Bandyopadhyay,Tai-hoon Kim +4 more
- pp 374-379
Reads0
Chats0
TLDR
A novel “Discrete Cosine Transformation based Image Authentication & Secret Message Transmission Scheme” (DCTIASMTT) has been proposed to authenticate a multimedia image and at the same time some ubiquitous secret message or image can be transmitted over the mobile network.Abstract:
In this paper a novel “Discrete Cosine Transformation based Image Authentication & Secret Message Transmission Scheme” (DCTIASMTT) has been proposed to authenticate a multimedia image and at the same time some ubiquitous secret message or image can be transmitted over the mobile network. Instead of direct embedding a message or image within the source image, choose a window of size 2x2 of the source image and then convert it from spatial domain to frequency domain using Discrete Cosine Transformation (DCT). The bits of the authenticating message or image are then embedded at LSB of the transformed image (excluding first pixel). Inverse DCT has been performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through reverse procedure. The experimental results have been discussed and compared with the existing steganographic algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with STools.read more
Citations
More filters
Journal ArticleDOI
Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain
TL;DR: The experimental results show, that the algorithm achieves high image quality and high tampering detection resolution at a low watermark payload, compared to block-based authentication schemes.
Proceedings ArticleDOI
A new robust and fragile watermarking scheme for images captured by mobile phone cameras
TL;DR: A watermarking scheme for images captured by mobile phone cameras that embeds two watermarks in the images for authentication checking and copyright protection that survived cropping, scaling, filtering, additive noise and JPEG compression.
Book ChapterDOI
Using PSO algorithm for simple LSB substitution based steganography scheme in DCT transformation domain
TL;DR: Experimental results show the improved method for embedding a secret message into a cover image with least significant bit (LSB) substitution in discrete cosine transformation (DCT) domain can keep the quality of the stego-image better, while the security of the hidden secret message is increased by use of the substitution matrix T.
Transmission and Authentication of Text Messages through Image Steganography
TL;DR: A scheme, which can encode a text message and transmit it safely to its destination and the receiver can authenticate the received message to ensure that any intruder has not altered the original message.
Proceedings ArticleDOI
Increase of Capacity and Quality of Frequency Based Image Steganography Using Particle Swarm Optimization
TL;DR: A steganography technique to enhance the capacity and quality of the stego object by hiding varied number of secret bits in the original image blocks depending upon the DCT coefficients remaining after quantizing the blocks.
References
More filters
Journal ArticleDOI
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding
Brian Chen,Gregory W. Wornell +1 more
TL;DR: It is shown that QIM is "provably good" against arbitrary bounded and fully informed attacks, and achieves provably better rate distortion-robustness tradeoffs than currently popular spread-spectrum and low-bit(s) modulation methods.
Journal ArticleDOI
Information-theoretic analysis of information hiding
TL;DR: An information-theoretic analysis of information hiding is presented, forming the theoretical basis for design of information-hiding systems and evaluating the hiding capacity, which upper-bounds the rates of reliable transmission and quantifies the fundamental tradeoff between three quantities.
Proceedings ArticleDOI
Analysis of LSB based image steganography techniques
TL;DR: It is shown that an observer can indeed distinguish between images carrying a hidden message and images which do not carry a message, which leads to the notion of steganographic capacity, that is, how many bits can the authors hide in a message without causing statistically significant modifications?
Journal ArticleDOI
Detection of LSB steganography via sample pair analysis
TL;DR: In this article, the authors introduce a new approach to detecting least significant bit (LSB) steganography in digital signals such as images and audio, which is based on some statistical measures of sample pairs that are highly sensitive to LSB embedding operations.
Journal Article
Detection of LSB steganography via sample pair analysis
TL;DR: It is shown that the length of hidden messages embedded in the least significant bits of signal samples can be estimated with relatively high precision and the new steganalytic approach is based on some statistical measures of sample pairs that are highly sensitive to LSB embedding operations.
Related Papers (5)
Discrete Fourier Transform based multimedia colour image authentication for wireless communication (DFTMCIAWC)
Nabin Ghoshal,J. K. Mandal +1 more