Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 337))

  • 2697 Accesses

Abstract

In this paper a G-Let based authentication technique has been proposed to authenticate digital documents by embedding a secret image/message inside the cover image in frequency domain. Cover image is transformed into G-Let domain to generate 2n number of G-Lets out of which selected G-Let(s) are embedded with secret message for the purpose of authentication or copyright protection. The special feature of IAFD-D3 is the use of Dihedral Group with ‘n’ equals to three. Thus total six G-Lets are generated out of which only single G-Let is used as a locker to lock the secret. Experimental results are computed and compared with the existing authentication techniques like GASMT, Li’s Method, STMDF, Region-Based based on Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Image Fidelity (IF), Universal Quality Image (UQI) and Structural Similarity Index Measurement (SSIM) shows better performance in IAFD-D3, in terms of low computational complexity and better image fidelity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wu, H.-C., Wu, N.-I., Tsai, C.-S., Hwang, M.-S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In: IEE Proceedings of the Vision, Image and Signal Processing 2005, vol. 152(5), pp. 611–615 (2005)

    Google Scholar 

  2. Walia, E., Jain, P., Navdeep: An Analysis of LSB & DCT based Steganography. Global Journal of Computer Science and Technology 10(1) (Ver 1.0), 4–8 (2010)

    Google Scholar 

  3. Ghoshal, N., Mandal, J.K.: A Novel Technique for Image Authentication in Frequency Domain Using Discrete Fourier Transformation Technique (IAFDDFTT). Malaysian Journal of Computer Science 21(1), 24–32 (2008) ISSN 0127-9084, Faculty of Computer Science & Information Technology, University of Malaya, Kuala Lumpur, Malyasia (2008)

    Google Scholar 

  4. Mandal, J.K., Sengupta, M.: Authentication /Secret Message Transformation Through Wavelet Transform based Subband Image Coding (WTSIC). In: IEEE International Symposium on Electronic System Design, Bhubaneswar, India, December 20-22, pp. 225–229 (2010), doi:10.1109/ISED.2010.50, ISBN 978-0-7695-4294-2, Print ISBN: 978-1-4244-8979-4

    Google Scholar 

  5. Sengupta, M., Mandal, J.K.: Image coding through Z-Transform with low Energy and Bandwidth (IZEB). In: The Third International Conference on Computer Science and Information Technology (CCSIT 2013), Bangalore, India, February 18-20 (2013)

    Google Scholar 

  6. Rajathilagam, B., Rangarajan, M., Soman, K.P.: G-Lets: A New Signal Processing Algorithm. International Journal of Computer Applications (0975 – 8887) 37(6) (January 2012), doi:10.5120/4609-6591

    Google Scholar 

  7. Yuancheng, L., Wang, X.: A watermarking method combined with Radon transform and 2D-wavelet transform. In: IEEE Proceedings of the 7th World Congress on Intelligent Control and Automation, Chongqing, China, June 25-27 (2008)

    Google Scholar 

  8. Tsui, T.T., Zhang, X.-P., Androutsos, D.: Color Image Watermarking Using Multidimensional Fourier Transformation. IEEE Trans. on Info. Forensics and Security 3(1), 16–28 (2008)

    Article  Google Scholar 

  9. Mandal, J.K., Sengupta, M.: Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF). In: IEEE Second International Conference on Emerging Applications of Information Technology (EAIT 2011), February 19-20, pp. 298–301 (2011), doi:10.1109/EAIT.2011.24, print ISBN: 978-1-4244-9683-9

    Google Scholar 

  10. Nikolaidis, A., Pitas, I.: Region-Based Image Watermarking. IEEE Transactions on Image Processing 10(11), 1721–1740 (2001)

    Article  Google Scholar 

  11. Sengupta, M., Mandal, J.K.: G-Let based Authentication/Secret Message Transmission (GASMT). In: IEEE 4th International Symposium on Electronic System Design, ISED 2013, NTU Singapore, December 10-12, pp. 186–190 (2013), doi:10.1109/ISED.2013.44, ISBN - 978-0-7695-5143-2

    Google Scholar 

  12. Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Security and Watermarking of Multimedia Contents Electronic Imaging 1999, vol. 3657. The International Society for Optical Engineering, Sans Jose (1999)

    Google Scholar 

  13. Weber, A.G.: The USC-SIPI Image Database: Version 5, Original release. Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering (October 1997), http://sipi.usc.edu/database/ (last accessed on January 25, 2010)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Madhumita Sengupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sengupta, M., Mandal, J.K., Khan, S.A. (2015). Image Authentication in Frequency Domain through G-Let Dihedral Group (IAFD-D3). In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337. Springer, Cham. https://doi.org/10.1007/978-3-319-13728-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13728-5_16

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13727-8

  • Online ISBN: 978-3-319-13728-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics