A Novel Technique for Image Authentication in Frequency Domain Using Discrete Fourier Transformation Technique (IAFDDFTT)

In this paper a novel technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT) has been proposed to authenticate a gray level PGM, TIFF image by embedding a message/image where 2 x 2 submatrix is taken as source matrix from the image matrix and transform into the frequency domain. Two bits of authenticating message/image are fabricated within the real part of each pixel, excluding the first pixel of each submatrix where the position is chosen using a hash function. The process is repeated for each submatrix on row major order to insert authenticating message/image content and 128 bits Message Digest (MD-5), generated from authenticating message/image. Inverse DFT is performed to transform the embedded image from frequency to spatial domain as final step of encoding. The decoding is done through the reverse procedure. The experimental results against statistical and visual attack has been discussed and compared with the existing steganography algorithm like S-Tools. Histogram analysis, noise analysis, and standard deviation computation of source image with embedded image shows the better results in comparison with existing S-Tools.

[1]  Nameer N. El-Emam Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .

[2]  Kian-Lee Tan,et al.  Steganographic schemes for file system and B-tree , 2004, IEEE Transactions on Knowledge and Data Engineering.

[3]  Vincent Rijmen,et al.  The NIST Cryptographic Workshop on Hash Functions , 2006, IEEE Secur. Priv..

[4]  V. Sridhar,et al.  Multivariate entropy detector based hybrid image registration , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[5]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[6]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[7]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[8]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[9]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[10]  Ning Liu,et al.  Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[11]  Roland Sauerbrey,et al.  Biography , 1992, Ann. Pure Appl. Log..