Skip to main content

A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images

  • 1382 Accesses

Part of the Communications in Computer and Information Science book series (CCIS,volume 536)

Abstract

In a cyberspace where disparate applications are engaged in multimedia transmission, data compression is a key for maintaining bandwidth usage efficiency as well meeting the data requirements of the disparate applications. Security of data in such environment needed to be guaranteed. Cryptographic approaches engaged in the process have to be efficient enough to stand against attacks and also to maintain important visual continents after compression. In our work, we proposed a fast discrete cosine transform and a cryptographic technique for authentication and security of digital images. The cryptographic approach was applied to the image after compression, and before decompression, the image was successfully decrypted without significant loss of visual data. There was a loss in pixel values due to the compression process. The implementation of the proposed approach was done successfully and analysis of the output results was done using MATLAB.

Keywords

  • Discrete Wavelet Transform
  • Encrypt Image
  • Plain Image
  • Cipher Image
  • Cryptographic Technique

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This work was supported by Lab-STICC (UMR CNRS 6285) Research Laboratory, UBO France, AWBC Canada, Ambassade de France-Institut Français-Ghana and the DCSIT-UCC

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-22915-7_9
  • Chapter length: 10 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   79.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-22915-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   99.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.
Fig. 9.
Fig. 10.
Fig. 11.
Fig. 12.

References

  1. Kang, H., Iwamura, K.: Information hiding method using best DCT and wavelet coefficients and itswatermark competition. Entropy 17(3), 1218–1235 (2015)

    CrossRef  Google Scholar 

  2. Tomar, R., Patni, J.C., Dumka, A., Anand, A.: Blind watermarking technique for grey scale image using block level discrete cosine transform (DCT). In: Satapathy, S.C., Govardhan, A., Srujan Raju, K., Mandal, J.K. (eds.) Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2, vol. 338, pp. 81–89. Springer, Heidelberg (2015)

    Google Scholar 

  3. Dumas, J.G., Roch, J.L., Tannier, E., Varrette, S.: Foundations of Coding: Compression, Encryption, Error Correction. Wiley, New Jersey (2015)

    CrossRef  Google Scholar 

  4. Ji, X.Y., Bai, S., Guo, Y., Guo, H.: A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding. Commun. Nonlinear Sci. Numer. Simul. 22(1), 321–333 (2015)

    CrossRef  Google Scholar 

  5. Furqan, A., Kumar, M.: Study and analysis of robust DWT-SVD domain based digital image watermarking technique using MATLAB. In: 2015 IEEE International Conference on Computational Intelligence and Communication Technology (CICT), pp. 638–644. IEEE, February 2015

    Google Scholar 

  6. Lin, S.D., Chen, C.-F.: A robust DCT-based watermarking for copyright protection. IEEE Trans. Consum. Electron. 46(3), 415–421 (2000). doi:10.1109/30.883387

    CrossRef  Google Scholar 

  7. Al-Haj, A.: Combined DWT-DCT digital image watermarking. J. Comput. Sci. 3(9), 740 (2007)

    CrossRef  Google Scholar 

  8. Douak, F., Benzid, R., Benoudjit, N.: Color image compression algorithm based on the DCT transform combined to an adaptive block scanning. AEU-Int. J. Electron. Commun. 65(1), 16–26 (2011)

    CrossRef  Google Scholar 

Download references

Acknowledgments

This work was supported by Lab-STICC (UMR CNRS 6285) at UBO France, AWBC Canada, Ambassade de France-Institut Français-Ghana and the DCSIT-UCC, and also Dominique Sotteau (formerly directeur de recherche, Centre national de la recherche scientifique (CNRS) in France and head of international relations, Institut national de recherche en informatique et automatique, INRIA) and currently the Scientific counselor of AWBC.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quist-Aphetsi Kester .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kester, QA., Nana, L., Pascu, A.C., Gire, S., Eghan, J.M., Quaynor, N.N. (2015). A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)