Skip to main content
Log in

An Authentication Technique for Image/Legal Document (ATILD)

  • Published:
Journal of Signal Processing Systems Aims and scope Submit manuscript

Abstract

The paper presents an image/legal-document authentication and secures message transmission technique by embedding message/image/message-digest into color images. Image authentication is done by embedding message/image within the image pixels of source image. Legal document authentication is done by embedding the authenticating image and self generated message digest (generated from signed document part) into the image part of the legal document. The position of insertion is chosen within each byte of source image using XOR operation between upper three bits of each source byte and k where k is any number from 0 to 7. Three bits of authenticating message/image/message-digest are embedded in each byte of source image. Fabrication process starts with the dimension of authenticating image followed by message digest (MD) and ends by embedding the content of authenticating message/image. To enhance the security further a layer has also been fabricated by XOR operation of the embedded image with another self generated MD key obtained from the source image. The decoding is done by applying the reverse algorithm. Experimental results are tested with the aid of Histogram analysis, noise analysis, standard deviation computation and PSNR, IF, MSE analysis of the source and embedded image and has been compared with popular existing steganographic algorithms like S-Tools where the proposed ATILD is capable to hide large volume of data than S-Tools and shows better performance. The proposed ATILD technique also shows high amount of sustainability against various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9

Similar content being viewed by others

References

  1. Ghoshal, N., & Mandal, J. K. (2008). A novel technique for image authentication in frequency domain using discrete fourier transformation technique (IAFDDFTT). Malaysian Journal of Computer Science, ISSN 0127–9084, 21(1), 24–32.

    Google Scholar 

  2. Ghoshal, N., Mandal, J. K., et al. (2008). Masking based data hiding and image authentication technique (MDHIAT), Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM-2008, December 14–17th, Anna University, Chennai, India, pp. 119–122.

  3. Radhakrishnan, R., Kharrazi, M., & Menon, N. (2005). Data masking: a new approach for steganography. Journal of VLSI Signal Processing, Springer, 41, 293–303.

    Article  Google Scholar 

  4. EL-Emam, N. N. (2007). Hiding a large amount of data with high security using steganography algorithm. Journal of Computer Science ISSN 1549–3636, 3(4), 223–232.

    Google Scholar 

  5. Amin, P., Lue, N., & Subbalakshmi, K. (2005). Statistically secure digital image data hiding, (pp. 1–4). IEEE Multimedia Signal Processing MMSP05, Shanghai, China, Oct. 2005.

  6. Chen, B., & Wornnel, G. W. (2001). Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4), 1423–1443.

    Article  MATH  Google Scholar 

  7. Chandramouli, R., & Memon, N. (2001). Analysis of LSB based image steganography techniques, (pp. 1019–1022). Proc. of ICIP, Thissaloniki, Greece.

  8. Lin, C. Y., & Chang, S. F. (1998). A robust image authentication method surviving JPEG lossy compression. Proceedings of SPIE, 3312, 296–307.

    Article  Google Scholar 

  9. Dumitrescu, S., Xiaolin, W., & Wang, Z. (2003). Detection of LSB steganography via sample pair analysis. In LNCS, (vol. 2578, pp. 355–372). New York: Springer-Verlag

  10. Moulin, P., & O’Sullivan, J. A. (2003). Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, 49(3), 563–593.

    Article  MathSciNet  MATH  Google Scholar 

  11. Pavan, S., Gangadharpalli, S., & Sridhar, V. (2005). Multivariate entropy detector based hybrid image registration algorithm, (pp. 18–23). IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, March 2005.

  12. Pang, H. H., Tan, K. L., & Zhou, X. (2004). Steganographic schemes for file system and B-tree. IEEE Transactions on Knowledge and Data Engineering, 16, 701–713.

    Article  Google Scholar 

  13. Moulin, P., & Mihcak, M. K. (2002). A framework for evaluating the data-hiding capacity of image sources. IEEE Transactions on Image Processing, 11, 1029–1042.

    Article  Google Scholar 

  14. Rechberger, C., Rijman, V., & Sklavos, N. (2006). The NIST cryptographic workshop on hash functions. IEEE Security & Privacy, 4, 54–56.

    Article  Google Scholar 

  15. Al-Hamami, A. H., & Al-Ani, S. A. (2005). A new approach for authentication technique. Journal of computer Science, ISSN 1549–3636, 1(1), 103–106.

    Google Scholar 

  16. S-Tools: http://digitalforensics.Champlain.Edu/download/stools4.zip.

  17. Kutter, M., Voloshynovskiy, S., & Herrigel, A. (2000). The Watermark copy attack. In Security and watermarking of multimedia contest II, SPIE-3971, (pp. 371–380). San Josh, USA, Jan. 2000.

  18. Ergun, F., Kilian, J., & Kumar, R. (1999). A note on the limits of collusion-resistant watermarks. In Eurocrypt 1999 (pp. 140–149, vol. 1592). LNCS, Springer Verlag.

  19. Linnartz, J.-P. M. G., & Dijk, M. V. (1998). Analysis of the sensitivity attack against electronic watermarks in images. In workshop information hiding 1998 LNCS, (Vol. 1525, pp. 258–272). Springer Verlag.

  20. Weber, A. G. (1997). The usc-sipi image database: http://sipi.usc.edu/services/database/Database.html, October 1997, Signal and Image Processing Institute at the University of Southern California.

Download references

Acknowledgement

The author expresses the deep sense of gratitude to the Dept. of Computer Sc. and Engg. & Dept. of Engineering and Technological Studies, University of Kalyani, where the work has been carried out.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nabin Ghoshal.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ghoshal, N., Mandal, J.K. & Khamrui, A. An Authentication Technique for Image/Legal Document (ATILD). J Sign Process Syst 67, 187–199 (2012). https://doi.org/10.1007/s11265-010-0557-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-010-0557-7

Keywords

Navigation