DCT Based Image Authentication with Partial Noise Reduction (DCTIAPNR)

  • Anirban Goswami
  • Dipankar Pal
  • Nabin Ghoshal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 199)


The concept, proposed here, may prove to be an innovative derivation in the field of frequency domain steganography for grayscale images. Sub image blocks, each of size 2x2 in row major order are taken from the carrier image and are passed through the process of Discrete Cosine Transform (DCT) to obtain the corresponding frequency components. In the process of embedding a single bit of secret message/image is inserted into the real part of the frequency component of 2nd, 3rd & 4th carrier image bytes of each block. The level of data obscurity scales up due to the application of a self devised hash function. It generates pseudorandom positions which control embedding and extraction of secret bits in and from the frequency components. In addition an adjustment is made on each embedded frequency component to optimally reduce the noise effect due to embedding. The results after experimenting with the proposed technique prove statistically improved performance compared to other exiting techniques.


Image Authentication Steganography DCT IDCT MSE PSNR IF SSIM 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Radhakrishnan, R., Kharrazi, M., Menon, N.: Data Masking: A new approach for steganography. Journal of VLSI Signal Processing 41, 293–303 (2005)Google Scholar
  2. 2.
    EL-Emam, N.N.: Hiding a large Amount of data with High Security Using Steganography Algorithm. Journal of Computer Science 3(4), 223–232 (2007) ISSN 1549-3636Google Scholar
  3. 3.
    Amin, P., Lue, N., Subbalakshmi, K.: Statistically secure digital image data hiding. In: IEEE Multimedia Signal Processing, MMSP 2005, Shanghai, China, pp. 1–4 (October 2005)Google Scholar
  4. 4.
    Pavan, S., Gangadharpalli, S., Sridhar, V.: Multivariate entropy detector based hybrid image registration algorithm. In: IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, pp. 18–23 (March 2005)Google Scholar
  5. 5.
    Al-Hamami, A.H., Al-Ani, S.A.: A New Approach for Authentication Technique. Journal of computer Science 1(1), 103–106 (2005) ISSN 1549-3636Google Scholar
  6. 6.
    Ker, A.: Steganalysis of Embedding in Two Least-Significant Bits. IEEE Transaction on Information Forensics and Security 2(1), 46–54 (2008) ISSN 1556-6013CrossRefGoogle Scholar
  7. 7.
    Yang, C., Liu, F., Luo, X., Liu, B.: Steganalysis Frameworks of Embedding in Multiple Least Significant Bits. IEEE Transaction on Information Forensics and Security 3(4), 662–672 (2008) ISSN 1556-6013CrossRefGoogle Scholar
  8. 8.
    Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pisel-value differencing and LSB replacement methods. Proc. Inst. Elect. Eng., Vis. Images Signal Processing 152(5), 611–615 (2005)CrossRefGoogle Scholar
  9. 9.
    Ahmidi, N., Safabkhsh, R.: A novel DCT-based approach for secure color image watermarking. In: Proc. Int. Conf. Information Technology: Coding and Computing, vol. 2, pp. 709–713 (April 2004)Google Scholar
  10. 10.
    Bas, P., Biham, N.L., Chassery, J.: Color watermarking using quaternion Fourier transformation. In: Proc. ICASSP, Hong Kong, China, pp. 521–524 (June 2003)Google Scholar
  11. 11.
    Tsui, T.T., Zhang, X.-P., Androutsos, D.: Color Image Watermarking Using Multidimensional Fourier Transfomation. IEEE Trans. on Info. Forensics and Security 3(1), 16–28 (2008)CrossRefGoogle Scholar
  12. 12.
    Luo, H., Yu, F.-X., Chen, H., Huang, Z.-L., Li, H., Wang, P.-H.: Reversible data hiding based on block median preservation. Information Sciences 181, 308–328 (2011)CrossRefGoogle Scholar
  13. 13.
    Ghosal, N., Goswami, A., Mondal, J.K., Pal, D.: Image Authentication Technique Based on DCT (IATDCT). In: Wyld, D.C., Zizka, J., Nagamalai, D. (eds.) Advances in Computer Science, Engg. & Appl. AISC, vol. 167, pp. 863–871. Springer, Heidelberg (2012)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Dept. of Information TechnologyTechno IndiaKolkataIndia
  2. 2.Dept. of Computer Science and EngineeringTechno IndiaKolkataIndia
  3. 3.Dept. of Engineering and Technological StudiesUniversity of KalyaniKalyaniIndia

Personalised recommendations