Image Authentication Technique Based on DCT (IATDCT)

  • Nabin Ghosal
  • Anirban Goswami
  • Jyotsna Kumar Mondal
  • Dipankar Pal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (volume 167)


In this paper a novel steganographic technique based on Discrete Cosine Transform (DCT) is demonstrated for image authentication in frequency domain. The transformation is implemented on sub-image block called mask of size 2 x 2 of spatial components in row major order for the entire image. Single bit of authenticating secret message/image is fabricated in the real part of the frequency component of 2nd and 3rd carrier image byte of each sub-image block. A minor re-adjustment is incorporated only in the first component of each sub image block after embedding to keep the pixel values positive and non fractional in spatial domain. Robustness is achieved through embedding secret bits in variable positions of the carrier image byte determined by random function and subsequent masking. Experimental results depict enhanced performance of the proposed watermarking technique.


Discrete Cosine Transform Source Image Image Block Secret Data Discrete Cosine Transform Coefficient 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Radhakrishnan, R., Kharrazi, M., Menon, N.: Data Masking: A new approach for steganography. Journal of VLSI Signal Processing 41, 293–303 (2005)CrossRefGoogle Scholar
  2. 2.
    EL-Emam, N.N.: Hiding a large Amount of data with High Security Using Steganography Algorithm. Journal of Computer Science 3(4), 223–232 (2007) ISSN 1549-3636CrossRefGoogle Scholar
  3. 3.
    Amin, P., Lue, N., Subbalakshmi, K.: Statistically secure digital image data hiding. In: IEEE Multimedia Signal Processing MMSP 2005, Shanghai, China, pp. 1–4 (October 2005)Google Scholar
  4. 4.
    Pavan, S., Gangadharpalli, S., Sridhar, V.: Multivariate entropy detector based hybrid image registration algorithm. In: IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, pp. 18–23 (March 2005)Google Scholar
  5. 5.
    Al-Hamami, A.H., Al-Ani, S.A.: A New Approach for Authentication Technique. Journal of Computer Science 1(1), 103–106 (2005) ISSN 1549-3636CrossRefGoogle Scholar
  6. 6.
    Ker, A.: Steganalysis of Embedding in Two Least-Significant Bits. IEEE Transaction on Information Forensics and Security 2(1), 46–54 (2008) ISSN 1556-6013CrossRefGoogle Scholar
  7. 7.
    Yang, C., Liu, F., Luo, X., Liu, B.: Steganalysis Frameworks of Embedding in Multiple Least Significant Bits. IEEE Transaction on Information Forensics and Security 3(4), 662–672 (2008) ISSN 1556-6013CrossRefGoogle Scholar
  8. 8.
    Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pisel-value differencing and LSB replacement methods. Proc. Inst. Elect. Eng., Vis. Images Signal Processing 152(5), 611–615 (2005)CrossRefGoogle Scholar
  9. 9.
    Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Adaptive Data Hiding in edge areas of Images With Spatial LSB Domain Systems. IEEE Transaction on Information Forensics and Security 3(3), 488–497 (2008) ISSN 1556-6013CrossRefGoogle Scholar
  10. 10.
    Ahmidi, N., Safabkhsh, R.: A novel DCT-based approach for secure color image watermarking. In: Proc. Int. Conf. Information Technology: Coding and Computing, vol. 2, pp. 709–713 (April 2004)Google Scholar
  11. 11.
    Bas, P., Biham, N.L., Chassery, J.: Color watermarking using quaternion Fourier transformation. In: Proc. ICASSP, Hong Kong, China, pp. 521–524 (June 2003)Google Scholar
  12. 12.
    Tsui, T.T., Zhang, X.-P., Androutsos, D.: Color Image Watermarking Using Multidimensional Fourier Transfomation. IEEE Trans. on Info. Forensics and Security 3(1), 16–28 (2008)CrossRefGoogle Scholar
  13. 13.
    Luo, H., Yu, F.-X., Chen, H., Huang, Z.-L., Li, H., Wang, P.-H.: Reversible data hiding based on block median preservation. Information Sciences 181, 308–328 (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  • Nabin Ghosal
    • 1
  • Anirban Goswami
    • 2
  • Jyotsna Kumar Mondal
    • 3
  • Dipankar Pal
    • 4
  1. 1.Dept. of Engineering and Technological StudiesUniversity of KalyaniKalyaniIndia
  2. 2.Dept of Information TechnologyTechno IndiaKolkataIndia
  3. 3.Dept. of Computer Science and EngineeringUniversity of KalyaniKalyaniIndia
  4. 4.Dept. of Computer Science and EngineeringTechno IndiaKolkataIndia

Personalised recommendations