Z Transformation-Based High Payload Authentication Technique with Higher Region of Convergence Value (ZATHRoc)

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 381)

Abstract

In this paper, a Z transformation-based authentication technique has been proposed with higher Region of Convergence (ROC) value. Sequentially, five bits from the authenticating mask in row major order are considered and embedded into composite real as well as imaginary components of second, third, and fourth transform domain coefficients keeping the low frequency component unaltered which is further utilized for adjustment. The proposed method provides a good secure scheme in terms of robustness and sensitivity of higher ROC of Z transform domain and also in terms of the inclusion of random chaotic map. Comparisons have been made with existing methods such as AINCDCT (2011), Luo’s Method (2011), SCDFT (2008), and AHRocZ (2015) which exhibit a better performance with proper visual quality.

Keywords

Generalized Forward Z Transformation (GFZT) Generalized Inverse Z Transformation (GIZT) Region of Convergence (ROC) Mean Square Error (MSE) Peak Signal to Noise Ratio (PSNR) Image Fidelity (IF) 

Notes

Acknowledgments

The authors express a sincere gratitude towards the Dept. of CSE, University of Kalyani where all the computational resources required for the work are used and the PURSE scheme of DST, Govt. of India.

References

  1. 1.
    Pareek, N.K., Patidar, V., Sud, K.K.: A random bit generator using chaotic maps. Int. J. Netw. Sec. 10(1), 32–38 (2010)Google Scholar
  2. 2.
    Allan, G.W.: The USC-SIPI Image Database: Version 5, Original release, October, 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering. http://sipi.usc.edu/database/. Accessed 05 March 2015
  3. 3.
    Sengupta, M., Mandal, J.K.: Authentication of images through non con-voluted DCT (AINCDCT). In: First International Conference on Communication and Industrial Application (ICCIA 2011), IEEE, pp. 1–4. doi: 10.1109/ICCIndA.2011.6146672 26–28 Dec 2011
  4. 4.
    Luo, H., Yu, F.-X., et al.: Reversible data hiding based on block median preservation. Inf. Sci. 181, 308–328 (2011). doi: 10.1016/j.ins.2010.09.022 CrossRefGoogle Scholar
  5. 5.
    Tsui, T.T., Zhang, X.P., Androutsos, D.: Color image watermarking using multidimensional fourier transformation. IEEE Trans. Info. Forensics Security. 3(1), 16–28 (2008)CrossRefGoogle Scholar
  6. 6.
    Mahapatra, S., Mandal, J.K., Sengupta, M.: Authentication in higher region of convergence of Z transform domain (AHRocZ). Adv. Intell. Syst. Comput. 340, 787–795 (2015)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity of Kalyani, Kalyani, NadiaWest BengalIndia

Personalised recommendations