A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 536)


In a cyberspace where disparate applications are engaged in multimedia transmission, data compression is a key for maintaining bandwidth usage efficiency as well meeting the data requirements of the disparate applications. Security of data in such environment needed to be guaranteed. Cryptographic approaches engaged in the process have to be efficient enough to stand against attacks and also to maintain important visual continents after compression. In our work, we proposed a fast discrete cosine transform and a cryptographic technique for authentication and security of digital images. The cryptographic approach was applied to the image after compression, and before decompression, the image was successfully decrypted without significant loss of visual data. There was a loss in pixel values due to the compression process. The implementation of the proposed approach was done successfully and analysis of the output results was done using MATLAB.


Discrete Wavelet Transform Encrypt Image Plain Image Cipher Image Cryptographic Technique 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This work was supported by Lab-STICC (UMR CNRS 6285) at UBO France, AWBC Canada, Ambassade de France-Institut Français-Ghana and the DCSIT-UCC, and also Dominique Sotteau (formerly directeur de recherche, Centre national de la recherche scientifique (CNRS) in France and head of international relations, Institut national de recherche en informatique et automatique, INRIA) and currently the Scientific counselor of AWBC.


  1. 1.
    Kang, H., Iwamura, K.: Information hiding method using best DCT and wavelet coefficients and itswatermark competition. Entropy 17(3), 1218–1235 (2015)CrossRefGoogle Scholar
  2. 2.
    Tomar, R., Patni, J.C., Dumka, A., Anand, A.: Blind watermarking technique for grey scale image using block level discrete cosine transform (DCT). In: Satapathy, S.C., Govardhan, A., Srujan Raju, K., Mandal, J.K. (eds.) Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2, vol. 338, pp. 81–89. Springer, Heidelberg (2015)Google Scholar
  3. 3.
    Dumas, J.G., Roch, J.L., Tannier, E., Varrette, S.: Foundations of Coding: Compression, Encryption, Error Correction. Wiley, New Jersey (2015)CrossRefGoogle Scholar
  4. 4.
    Ji, X.Y., Bai, S., Guo, Y., Guo, H.: A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding. Commun. Nonlinear Sci. Numer. Simul. 22(1), 321–333 (2015)CrossRefGoogle Scholar
  5. 5.
    Furqan, A., Kumar, M.: Study and analysis of robust DWT-SVD domain based digital image watermarking technique using MATLAB. In: 2015 IEEE International Conference on Computational Intelligence and Communication Technology (CICT), pp. 638–644. IEEE, February 2015Google Scholar
  6. 6.
    Lin, S.D., Chen, C.-F.: A robust DCT-based watermarking for copyright protection. IEEE Trans. Consum. Electron. 46(3), 415–421 (2000). doi: 10.1109/30.883387 CrossRefGoogle Scholar
  7. 7.
    Al-Haj, A.: Combined DWT-DCT digital image watermarking. J. Comput. Sci. 3(9), 740 (2007)CrossRefGoogle Scholar
  8. 8.
    Douak, F., Benzid, R., Benoudjit, N.: Color image compression algorithm based on the DCT transform combined to an adaptive block scanning. AEU-Int. J. Electron. Commun. 65(1), 16–26 (2011)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Lab-STICC (UMR CNRS 6285)European University of Brittany, University of Brest FranceBrestFrance
  2. 2.Faculty of InformaticsGhana Technology University CollegeAccraGhana
  3. 3.Department of Computer Science and Information TechnologyUniversity of Cape CoastCape CoastGhana

Personalised recommendations