Z Transform Based Digital Image Authentication Using Quantization Index Modulation (Z-DIAQIM)

  • Nabin Ghoshal
  • Soumit Chowdhury
  • Jyotsna Kumar Mandal
Part of the Advances in Intelligent Systems and Computing book series (volume 167)

Abstract

This paper presents a novel Steganographic technique of color image authentication technique based on the Discrete two dimensional Z-Transform using Quantization Index Modulation (QIM). The Z-Transform is applied on sub-image block of size 2 x 2 in row major order of the carrier image for frequency components of the corresponding spatial components. Image authentication is done by hiding secret message/image into the real part of the frequency component of the carrier image. A single bit of secret message/image is embedded in each carrier image byte based on Quantization Index Modulation where a tolerance factor Δ has been used for invisible embedding. After embedding, a delicate re-adjusting phase is applied in all the frequency components of each mask, to keep the pixel values positive and non-fractional in the spatial domain. It is also applicable for secrete data transmission through carrier color image by hiding secrete data. Experimental results proof the robustness and performance of the proposed technique.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ghoshal, N., Mandal, J.K.: A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT). Malaysian Journal of Computer Science 21(1), 24–32 (2008) ISSN 0127-9094Google Scholar
  2. 2.
    Ghoshal, N., Mandal, J.K.: A Bit Level Image Authentication / Secrete Message Transmission Technique (BLIA/SMTT), Association for the Advancement of Modelling & Simulation Technique in Enterprises (AMSE). AMSE Journal of Signal Processing and Pattern Recognition 51(4), 1–13 (2008)Google Scholar
  3. 3.
    Ghoshal, N., Mandal, J.K., et al.: Masking based Data Hiding and Image Authentication Technique (MDHIAT). In: Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM 2008, Anna University, Chennai, India, December 14-17, pp. 119–122 (2008) ISBN: 978-1-4244-2962-2Google Scholar
  4. 4.
    EL-Emam, N.N.: Hiding a large Amount of data with High Security Using Steganography Algorithm. Journal of Computer Science 3(4), 223–232 (2007) ISSN 1549-3636CrossRefGoogle Scholar
  5. 5.
    Ker, A.: Steganalysis of Embedding in Two Least-Significant Bits. IEEE Transaction on Information Forensics and Security 2(1), 46–54 (2008) ISSN 1556-6013CrossRefGoogle Scholar
  6. 6.
    Yang, C., Liu, F., Luo, X., Liu, B.: Steganalysis Frameworks of Embedding in Multiple Least Significant Bits. IEEE Transaction on Information Forensics and Security 3(4), 662–672 (2008) ISSN 1556-6013CrossRefGoogle Scholar
  7. 7.
    Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pisel-value differencing and LSB replacement methods. Proc. Inst. Elect. Eng., Vis. Images Signal Processing 152(5), 611–615 (2005)CrossRefGoogle Scholar
  8. 8.
    Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Adaptive Data Hiding in edge areas of Images With Spatial LSB Domain Systems. IEEE Transaction on Information Forensics and Security 3(3), 488–497 (2008) ISSN 1556-6013CrossRefGoogle Scholar
  9. 9.
    Ahmidi, N., Safabkhsh, R.: A novel DCT-based approach for secure color image watermarking. In: Proc. Int. Conf. Information technology: Coding and Computing, vol. 2, pp. 709–713 (April 2004)Google Scholar
  10. 10.
    Bas, P., Biham, N.L., Chassery, J.: Color watermarking using Quaternion Fourier Transformation. In: Proc. ICASSP, Hong Kong, China, pp. 521–524 (June 2003)Google Scholar
  11. 11.
    Tsui, T.T., Zhang, X.-P., Androutsos, D.: Color Image Watermarking Using Multidimensional Fourier Transfomation. IEEE Trans. on Info. Forensics and Security 3(1), 16–28 (2008)CrossRefGoogle Scholar
  12. 12.
    Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Electronic Imaging 1999, Security and Watermarking for Multimedia Content, San Josh, CA, vol. 3657, pp. 226–239 (1999)Google Scholar
  13. 13.
    Weber, A.G.: The usc-sipi image database: http://sipi.usc.edu/services/database/Database.html, Signal and Image Processing Institute at the University of Southern California (October 1997)
  14. 14.
    Ghoshal, N., Mandal, J.K.: Discrete Fourier transform based Multimedia Color Image Authentication for Wireless Communication (DFTMCIAWC). In: 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Le Royal Meridian Chennai, India, February 28-March 3 (2011) ISBN: 978-1-4577-0787-2/11Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  • Nabin Ghoshal
    • 1
  • Soumit Chowdhury
    • 2
  • Jyotsna Kumar Mandal
    • 3
  1. 1.Dept. of Engineering and Technological StudiesUniversity of KalyaniKalyaniIndia
  2. 2.Dept. of Computer Science and EngineeringGovt. College of Engineering & Ceramic TechnologyKolkataIndia
  3. 3.Dept. of Computer Science and EngineeringUniversity of KalyaniKalyaniIndia

Personalised recommendations