Authentication in Higher Region of Convergence of Z Transform Domain (AHRocZ)

作者: Suman Mahapatra , J. K. Mandal , Madhumita Sengupta

DOI: 10.1007/978-81-322-2247-7_80

关键词:

摘要: In this paper a novel technique for authentication has been proposed in composite real and imaginary components of Z transform domain higher region convergence \( (r = 2) \). Three bits from authenticating image are embedded into as well second, third fourth coefficients keeping the low frequency component it is used adjustment. The method obtain good security terms robustness sensitivity magnitude. A comparison made with existing methods such AINCDCT (Authentication images through non convoluted DCT, IEEE, pp. 1–4, 2011 [3]), Luo’s Method (Inf Sci 181:308–328, [4]), SCDFT (IEEE Trans Inf Forensics Secur 3(1):16–28, 2008 [5]) which shows better performance visual quality.

参考文章(4)
Hao Luo, Fa-Xin Yu, Hua Chen, Zheng-Liang Huang, Hui Li, Ping-Hui Wang, Reversible data hiding based on block median preservation Information Sciences. ,vol. 181, pp. 308- 328 ,(2011) , 10.1016/J.INS.2010.09.022
Tsz Kin Tsui, Xiao-Ping Zhang, Dimitrios Androutsos, Color Image Watermarking Using Multidimensional Fourier Transforms IEEE Transactions on Information Forensics and Security. ,vol. 3, pp. 16- 28 ,(2008) , 10.1109/TIFS.2007.916275
Madhumita Sengupta, J. K. Mandal, Authentication of images through non convoluted DCT (AINCDCT) 2011 International Conference on Communication and Industrial Application. pp. 1- 4 ,(2011) , 10.1109/ICCINDA.2011.6146672
Narendra K Pareek, Vinod Patidar, Krishan K Sud, A Random Bit Generator Using Chaotic Maps International Journal of Network Security. ,vol. 10, pp. 32- 38 ,(2010) , 10.6633/IJNS.201001.10(1).05