{"title":"基于离散傅里叶变换的多媒体彩色图像无线通信认证(DFTMCIAWC)","authors":"N. Ghoshal, J. K. Mandal","doi":"10.1109/WIRELESSVITAE.2011.5940849","DOIUrl":null,"url":null,"abstract":"This paper presents a novel steganographic schemes based on Discrete Fourier Transformation (DFT) and demonstrates the multimedia colour image authentication process in frequency domain for wireless communication(DFTMCIAWC). Authentication is done through embedding secrete message/image into the transformed frequency components of the source image at message originating node. The DFT is applied on sub-image block called mask of size 2 × 2 in row major order where authenticating message/image bit is fabricated within the real frequency component of each source image byte except the first frequency component of each mask. In order to retain the quantum value positive and non fractional in spatial domain, a delicate readjustment phase is used in the first frequency component of each mask as a post embedding handler. Robustness is achieved through embedding secrete message/image into both positive and negatives frequency component of source image and invisibility is satisfied in spatial domain using delicate re-adjust phase. Inverse DFT (IDFT) is performed after embedding to transform embedded image from frequency domain to spatial domain and the embedded image is transmitted across the network. At the destination node authentication is done through extraction process of embedded image. Experimental results demonstrate that the proposed algorithm performs better than discrete cosine transformation and quaternion Fourier transformation based schemes, and provide security and originality of data in wireless domain.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Discrete Fourier Transform based multimedia colour image authentication for wireless communication (DFTMCIAWC)\",\"authors\":\"N. Ghoshal, J. K. Mandal\",\"doi\":\"10.1109/WIRELESSVITAE.2011.5940849\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a novel steganographic schemes based on Discrete Fourier Transformation (DFT) and demonstrates the multimedia colour image authentication process in frequency domain for wireless communication(DFTMCIAWC). Authentication is done through embedding secrete message/image into the transformed frequency components of the source image at message originating node. The DFT is applied on sub-image block called mask of size 2 × 2 in row major order where authenticating message/image bit is fabricated within the real frequency component of each source image byte except the first frequency component of each mask. In order to retain the quantum value positive and non fractional in spatial domain, a delicate readjustment phase is used in the first frequency component of each mask as a post embedding handler. Robustness is achieved through embedding secrete message/image into both positive and negatives frequency component of source image and invisibility is satisfied in spatial domain using delicate re-adjust phase. Inverse DFT (IDFT) is performed after embedding to transform embedded image from frequency domain to spatial domain and the embedded image is transmitted across the network. At the destination node authentication is done through extraction process of embedded image. Experimental results demonstrate that the proposed algorithm performs better than discrete cosine transformation and quaternion Fourier transformation based schemes, and provide security and originality of data in wireless domain.\",\"PeriodicalId\":68078,\"journal\":{\"name\":\"无线互联科技\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-07-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"无线互联科技\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.1109/WIRELESSVITAE.2011.5940849\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"无线互联科技","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940849","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Discrete Fourier Transform based multimedia colour image authentication for wireless communication (DFTMCIAWC)
This paper presents a novel steganographic schemes based on Discrete Fourier Transformation (DFT) and demonstrates the multimedia colour image authentication process in frequency domain for wireless communication(DFTMCIAWC). Authentication is done through embedding secrete message/image into the transformed frequency components of the source image at message originating node. The DFT is applied on sub-image block called mask of size 2 × 2 in row major order where authenticating message/image bit is fabricated within the real frequency component of each source image byte except the first frequency component of each mask. In order to retain the quantum value positive and non fractional in spatial domain, a delicate readjustment phase is used in the first frequency component of each mask as a post embedding handler. Robustness is achieved through embedding secrete message/image into both positive and negatives frequency component of source image and invisibility is satisfied in spatial domain using delicate re-adjust phase. Inverse DFT (IDFT) is performed after embedding to transform embedded image from frequency domain to spatial domain and the embedded image is transmitted across the network. At the destination node authentication is done through extraction process of embedded image. Experimental results demonstrate that the proposed algorithm performs better than discrete cosine transformation and quaternion Fourier transformation based schemes, and provide security and originality of data in wireless domain.