scispace - formally typeset
Proceedings ArticleDOI

Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme

Reads0
Chats0
TLDR
A novel “Discrete Cosine Transformation based Image Authentication & Secret Message Transmission Scheme” (DCTIASMTT) has been proposed to authenticate a multimedia image and at the same time some ubiquitous secret message or image can be transmitted over the mobile network.
Abstract
In this paper a novel “Discrete Cosine Transformation based Image Authentication & Secret Message Transmission Scheme” (DCTIASMTT) has been proposed to authenticate a multimedia image and at the same time some ubiquitous secret message or image can be transmitted over the mobile network. Instead of direct embedding a message or image within the source image, choose a window of size 2x2 of the source image and then convert it from spatial domain to frequency domain using Discrete Cosine Transformation (DCT). The bits of the authenticating message or image are then embedded at LSB of the transformed image (excluding first pixel). Inverse DCT has been performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through reverse procedure. The experimental results have been discussed and compared with the existing steganographic algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with STools.

read more

Citations
More filters
Journal ArticleDOI

Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain

TL;DR: The experimental results show, that the algorithm achieves high image quality and high tampering detection resolution at a low watermark payload, compared to block-based authentication schemes.
Proceedings ArticleDOI

A new robust and fragile watermarking scheme for images captured by mobile phone cameras

TL;DR: A watermarking scheme for images captured by mobile phone cameras that embeds two watermarks in the images for authentication checking and copyright protection that survived cropping, scaling, filtering, additive noise and JPEG compression.
Book ChapterDOI

Using PSO algorithm for simple LSB substitution based steganography scheme in DCT transformation domain

TL;DR: Experimental results show the improved method for embedding a secret message into a cover image with least significant bit (LSB) substitution in discrete cosine transformation (DCT) domain can keep the quality of the stego-image better, while the security of the hidden secret message is increased by use of the substitution matrix T.

Transmission and Authentication of Text Messages through Image Steganography

TL;DR: A scheme, which can encode a text message and transmit it safely to its destination and the receiver can authenticate the received message to ensure that any intruder has not altered the original message.
Proceedings ArticleDOI

Increase of Capacity and Quality of Frequency Based Image Steganography Using Particle Swarm Optimization

TL;DR: A steganography technique to enhance the capacity and quality of the stego object by hiding varied number of secret bits in the original image blocks depending upon the DCT coefficients remaining after quantizing the blocks.
References
More filters
Journal ArticleDOI

Quantization index modulation: a class of provably good methods for digital watermarking and information embedding

TL;DR: It is shown that QIM is "provably good" against arbitrary bounded and fully informed attacks, and achieves provably better rate distortion-robustness tradeoffs than currently popular spread-spectrum and low-bit(s) modulation methods.
Journal ArticleDOI

Information-theoretic analysis of information hiding

TL;DR: An information-theoretic analysis of information hiding is presented, forming the theoretical basis for design of information-hiding systems and evaluating the hiding capacity, which upper-bounds the rates of reliable transmission and quantifies the fundamental tradeoff between three quantities.
Proceedings ArticleDOI

Analysis of LSB based image steganography techniques

TL;DR: It is shown that an observer can indeed distinguish between images carrying a hidden message and images which do not carry a message, which leads to the notion of steganographic capacity, that is, how many bits can the authors hide in a message without causing statistically significant modifications?
Journal ArticleDOI

Detection of LSB steganography via sample pair analysis

TL;DR: In this article, the authors introduce a new approach to detecting least significant bit (LSB) steganography in digital signals such as images and audio, which is based on some statistical measures of sample pairs that are highly sensitive to LSB embedding operations.
Journal Article

Detection of LSB steganography via sample pair analysis

TL;DR: It is shown that the length of hidden messages embedded in the least significant bits of signal samples can be estimated with relatively high precision and the new steganalytic approach is based on some statistical measures of sample pairs that are highly sensitive to LSB embedding operations.
Related Papers (5)