3 research outputs found

    A Frequency Domain Steganography using Z Transform (FDSZT)

    Full text link
    Image steganography is art of hiding information onto the cover image. In this proposal a transformed domain based gray scale image authentication/data hiding technique using Z transform (ZT) termed as FDSZT, has been proposed. ZTransform is applied on 2x2 masks of the source image in row major order to transform original sub image (cover image) block to its corresponding frequency domain. One bit of the hidden image is embedded in each mask of the source image onto the fourth LSB of transformed coefficient based on median value of the mask. A delicate handle has also been performed as post embedding operation for proper decoding. Stego sub image is obtained through a reverse transform as final step of embedding in a mask. During the process of embedding, dimension of the hidden image followed by the content of the message/hidden image are embedded. Reverse process is followed during decoding. High PSNR obtained for various images conform the quality of invisible watermark of FDSZT.Comment: 4 pages, International Workshop on Embedded Computing and Communication System(IWECC 2011), Rajagiri School of Engineering & Technology, 22-23 December 2011, Kochi

    A Novel Technique for Secret Message / Image Transmission through (2, 2)Visual Cryptographic Protocol (SMITVCP)

    Full text link
    In this paper a secret message/image transmission technique has been proposed through (2, 2) visual cryptographic share which is non-interpretable in general. A binary image is taken as cover image and authenticating message/image has been fabricated into it through a hash function where two bits in each pixel within four bits from LSB of the pixel is embedded and as a result it converts the binary image to gray scale one. (2,2) visual cryptographic shares are generated from this converted gray scale image. During decoding shares are combined to regenerate the authenticated image from where the secret message/image is obtained through the same hash function along with reduction of noise. Noise reduction is also done on regenerated authenticated image to regenerate original cover image at destination.Comment: 7 page paper in Proceeding of International Conference on Computing and Systems ICCS 2010, ISBN 93-80813-01-5, pp 151-155, University of Burdwan, 19th, 20th November, 201

    Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT)

    Full text link
    In this paper a novel data embedding technique in frequency domain has been proposed using Discrete Fourier Transform (DFT) for image authentication and secured message transmission based on hiding a large volume of data into gray images. Image authentication is done by embedding message or image in frequency domain by choosing image blocks of size 2 x 2, called mask, from the source image in row major order and transform it into the frequency domain using DFT. Three bits of authenticating message/image/message-digest are fabricated within the real parts of each source image byte except first frequency component of each mask. The dimension of authenticating image followed by message digest (MD) and the content of authenticating message/image are also embedded. Inverse DFT (IDFT) is performed on embedded data to transform embedded frequency component to spatial component. In order to keep the quantum value positive and non negative in spatial domain a strong and robust technique is incorporated mainly on the first frequency component and sometimes on other component depends upon situations. The decoding is done by applying the reverse algorithm. Experimental results conform that the proposed algorithm performs better than DCT, QFT and SCDFT schemes.Comment: 7 page paper in Proceeding of International Conference on Computing and Systems ICCS 2010, ISBN 93-80813-01-5, pp 151-155, University of Burdwan, 19th, 20th November, 201
    corecore