{"title":"Authentication technique for gray images using DCT (ATGIDCT)","authors":"A. Goswami, D. Pal, N. Ghoshal","doi":"10.1109/EAIT.2012.6407989","DOIUrl":null,"url":null,"abstract":"This paper describes a novel steganographic technique based on Discrete Cosine Transform (DCT) for image authentication in frequency domain. The embedding algorithm applies DCT on a sub-image block called mask of size 2 × 2 of spatial components in row major order for the whole carrier image. Single bit of authenticating secret message/image is fabricated only in the real part of the frequency component of 2nd, 3rd and 4th carrier image bytes of each mask. The positions for embedding are pseudorandom in nature owing to a self derived hash function, which helps to improve the robustness of the technique. Also a minor re-adjustment is implemented only on the first component of each mask after embedding to keep the pixel values positive and non fractional in spatial domain. Experimental results prove statistically significantly enhanced performance of the proposed watermark technique.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third International Conference on Emerging Applications of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EAIT.2012.6407989","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This paper describes a novel steganographic technique based on Discrete Cosine Transform (DCT) for image authentication in frequency domain. The embedding algorithm applies DCT on a sub-image block called mask of size 2 × 2 of spatial components in row major order for the whole carrier image. Single bit of authenticating secret message/image is fabricated only in the real part of the frequency component of 2nd, 3rd and 4th carrier image bytes of each mask. The positions for embedding are pseudorandom in nature owing to a self derived hash function, which helps to improve the robustness of the technique. Also a minor re-adjustment is implemented only on the first component of each mask after embedding to keep the pixel values positive and non fractional in spatial domain. Experimental results prove statistically significantly enhanced performance of the proposed watermark technique.