3 research outputs found
A Frequency Domain Steganography using Z Transform (FDSZT)
Image steganography is art of hiding information onto the cover image. In
this proposal a transformed domain based gray scale image authentication/data
hiding technique using Z transform (ZT) termed as FDSZT, has been proposed.
ZTransform is applied on 2x2 masks of the source image in row major order to
transform original sub image (cover image) block to its corresponding frequency
domain. One bit of the hidden image is embedded in each mask of the source
image onto the fourth LSB of transformed coefficient based on median value of
the mask. A delicate handle has also been performed as post embedding operation
for proper decoding. Stego sub image is obtained through a reverse transform as
final step of embedding in a mask. During the process of embedding, dimension
of the hidden image followed by the content of the message/hidden image are
embedded. Reverse process is followed during decoding. High PSNR obtained for
various images conform the quality of invisible watermark of FDSZT.Comment: 4 pages, International Workshop on Embedded Computing and
Communication System(IWECC 2011), Rajagiri School of Engineering &
Technology, 22-23 December 2011, Kochi
A Novel Technique for Secret Message / Image Transmission through (2, 2)Visual Cryptographic Protocol (SMITVCP)
In this paper a secret message/image transmission technique has been proposed
through (2, 2) visual cryptographic share which is non-interpretable in
general. A binary image is taken as cover image and authenticating
message/image has been fabricated into it through a hash function where two
bits in each pixel within four bits from LSB of the pixel is embedded and as a
result it converts the binary image to gray scale one. (2,2) visual
cryptographic shares are generated from this converted gray scale image. During
decoding shares are combined to regenerate the authenticated image from where
the secret message/image is obtained through the same hash function along with
reduction of noise. Noise reduction is also done on regenerated authenticated
image to regenerate original cover image at destination.Comment: 7 page paper in Proceeding of International Conference on Computing
and Systems ICCS 2010, ISBN 93-80813-01-5, pp 151-155, University of Burdwan,
19th, 20th November, 201
Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT)
In this paper a novel data embedding technique in frequency domain has been
proposed using Discrete Fourier Transform (DFT) for image authentication and
secured message transmission based on hiding a large volume of data into gray
images. Image authentication is done by embedding message or image in frequency
domain by choosing image blocks of size 2 x 2, called mask, from the source
image in row major order and transform it into the frequency domain using DFT.
Three bits of authenticating message/image/message-digest are fabricated within
the real parts of each source image byte except first frequency component of
each mask. The dimension of authenticating image followed by message digest
(MD) and the content of authenticating message/image are also embedded. Inverse
DFT (IDFT) is performed on embedded data to transform embedded frequency
component to spatial component. In order to keep the quantum value positive and
non negative in spatial domain a strong and robust technique is incorporated
mainly on the first frequency component and sometimes on other component
depends upon situations. The decoding is done by applying the reverse
algorithm. Experimental results conform that the proposed algorithm performs
better than DCT, QFT and SCDFT schemes.Comment: 7 page paper in Proceeding of International Conference on Computing
and Systems ICCS 2010, ISBN 93-80813-01-5, pp 151-155, University of Burdwan,
19th, 20th November, 201