作者: Suman Mahapatra , J. K. Mandal , Madhumita Sengupta
DOI: 10.1007/978-81-322-2247-7_80
关键词:
摘要: In this paper a novel technique for authentication has been proposed in composite real and imaginary components of Z transform domain higher region convergence \( (r = 2) \). Three bits from authenticating image are embedded into as well second, third fourth coefficients keeping the low frequency component it is used adjustment. The method obtain good security terms robustness sensitivity magnitude. A comparison made with existing methods such AINCDCT (Authentication images through non convoluted DCT, IEEE, pp. 1–4, 2011 [3]), Luo’s Method (Inf Sci 181:308–328, [4]), SCDFT (IEEE Trans Inf Forensics Secur 3(1):16–28, 2008 [5]) which shows better performance visual quality.