Image Authentication in Frequency Domain through G-Let Dihedral Group (IAFD-D3)

In this paper a G-Let based authentication technique has been proposed to authenticate digital documents by embedding a secret image/message inside the cover image in frequency domain. Cover image is transformed into G-Let domain to generate 2n number of G-Lets out of which selected G-Let(s) are embedded with secret message for the purpose of authentication or copyright protection. The special feature of IAFD-D3 is the use of Dihedral Group with ‘n’ equals to three. Thus total six G-Lets are generated out of which only single G-Let is used as a locker to lock the secret. Experimental results are computed and compared with the existing authentication techniques like GASMT, Li’s Method, STMDF, Region-Based based on Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Image Fidelity (IF), Universal Quality Image (UQI) and Structural Similarity Index Measurement (SSIM) shows better performance in IAFD-D3, in terms of low computational complexity and better image fidelity.

[1]  Xiao-Ping Zhang,et al.  Color Image Watermarking Using Multidimensional Fourier Transforms , 2008, IEEE Transactions on Information Forensics and Security.

[2]  Yuancheng Li,et al.  A watermarking method combined with Radon transform and 2D-wavelet transform , 2008, 2008 7th World Congress on Intelligent Control and Automation.

[3]  Ioannis Pitas,et al.  Region-based image watermarking , 2001, IEEE Trans. Image Process..

[4]  Ekta Walia,et al.  An Analysis of LSB & DCT based Steganography , 2010 .

[5]  Jimson Mathew,et al.  G-Let Based Authentication/Secret Message Transmission (GASMT) , 2013, 2013 International Symposium on Electronic System Design.

[6]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[7]  Madhumita Sengupta,et al.  IMAGE CODING THROUGH Z- TRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB) , 2013 .

[8]  Madhumita Sengupta,et al.  Authentication/Secret Message Transformation through Wavelet Transform Based Subband Image Coding (WTSIC) , 2010, 2010 International Symposium on Electronic System Design.

[9]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[10]  Murali Rangarajan,et al.  G-Lets: A New Signal Processing Algorithm , 2012 .

[11]  J. K. Mandal,et al.  A Novel Technique for Image Authentication in Frequency Domain Using Discrete Fourier Transformation Technique (IAFDDFTT) , 2008 .

[12]  M. Hwang,et al.  (IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement , 2005 .

[13]  Madhumita Sengupta,et al.  Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF) , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.