Skip to main content

Image Data Hiding Technique Using Discrete Fourier Transformation

  • Conference paper
Ubiquitous Computing and Multimedia Applications (UCMA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 151))

Abstract

In this paper a novel technique, Discrete Fourier Transformation based Image Authentication has been proposed to authenticate an image and with its own application one can also transmit secret message or image over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner then convert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. EL-Eman, N.N.: Hiding a large Amount of data with High Security Using Steganography Algorithm. Journal of Computer Sciences, 223–232 (April 2007)

    Google Scholar 

  2. Amin, P.K., Liu, N., Subbalakshmi, K.P.: Statistically Secure Digital Image Data Hiding. In: IEEE 7th Workshop Multimedia Signal Processing, Shanghai, October 2005, pp. 1–4 (2005)

    Google Scholar 

  3. Chandramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. In: International Conference on Image Processing, Thessaloniki, Greece, pp. 1019–1022 (2001)

    Google Scholar 

  4. Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing 51(7), 1995–2007 (2003)

    Article  MATH  Google Scholar 

  5. Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. on Information Theory 47, 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  6. Moulin, P., O’Sullivan, J.A.: Information-theoretic analysis of information hiding. In: IEEE International Symposium on Information Theory, Sorrento, Italy, p. 19 (June 2000)

    Google Scholar 

  7. Moulin, P., Kıvanc Mıhcak, M.: A Framework for Evaluating the Data-Hiding Capacity of Image Sources. IEEE Trans. on Image Processing 11, 1029–1042 (2002)

    Article  Google Scholar 

  8. Lin, C.-Y., Chang, S.-F.: A robust image authentication method surviving JPEG lossy compression. In: SPIE, pp. 296–307 (1998)

    Google Scholar 

  9. Pavan, S., Sridhar, G., Sridhar, V.: Multivariate entropy detector based hybrid image registration. In: IEEE ICASSP 2005, March 18-23, vol. 2, pp. ii/873–ii/876 (2005)

    Google Scholar 

  10. Pang, H.H., Tan, K.L., Zhou, X.: Steganographic schemes for file system and B-tree. IEEE Transaction on Knowledge and Data Engineering 16(6), 701–713 (2004)

    Article  Google Scholar 

  11. http://digitalforensics.Champlain.Edu/downloads/s-tools4.zip

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhattacharyya, D., Kim, Th. (2011). Image Data Hiding Technique Using Discrete Fourier Transformation. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Ubiquitous Computing and Multimedia Applications. UCMA 2011. Communications in Computer and Information Science, vol 151. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20998-7_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20998-7_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20997-0

  • Online ISBN: 978-3-642-20998-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics