Share This Article:

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Abstract Full-Text HTML Download Download as PDF (Size:231KB) PP. 363-370
DOI: 10.4236/ijcns.2009.25040    4,654 Downloads   8,554 Views   Citations

ABSTRACT

In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be transmitted over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner and then con-vert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

D. BHATTACHARYYA, J. DUTTA, P. DAS, S. Kumar BANDYOPADHYAY and T. KIM, "Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation," International Journal of Communications, Network and System Sciences, Vol. 2 No. 5, 2009, pp. 363-370. doi: 10.4236/ijcns.2009.25040.

References

[1] N. Nameer and E. Eman, “Hiding a large amount of data with high security using steganography algorithm,” Journal of Computer Sciences, pp. 223-232, April 2007.
[2] P. K. Amin, N. Liu, and K. P. Subbalakshmi, “Statistically secure digital image data hiding,” Multimedia Signal Processing, IEEE 7th Workshop, Shanghai, pp. 1-4, October 2005.
[3] R. Chandramouli and N. Memon, “Analysis of LSB based image steganography techniques,” International Conference on Image Processing, Thessaloniki, Greece, pp. 1019-1022, 2001.
[4] S. Dumitrescu, X. L. Wu, and Z. Wang, “Detection of LSB steganography via sample pair analysis,” IEEE Transactions on Signal Processing, Vol. 51, No. 7, pp. 1995-2007, July 2003.
[5] B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Transac-tion on Information Theory, Vol. 47, pp. 1423-1443, 2001.
[6] P. Moulin and J. A. O’Sullivan, “Information-theoretic analysis of information hiding,” IEEE International Symposium on Information Theory, Sorrento, Italy, pp. 19, June 2000.
[7] P. Moulin and M. K. M?hcak, “A framework for evaluating the data-hiding capacity of image sources,” IEEE Transaction on Image Processing, Vol. 11, pp. 1029- 1042, September 2002.
[8] C. Y. Lin and S. F. Chang, “A robust image authentication method surviving JPEG lossy compression,” SPIE, pp. 296-307, 1998.
[9] S. Pavan, G. Sridhar, and V. Sridhar, “Multivariate entropy detector based hybrid image registration,” IEEE ICASSP, Vol. 2, pp. 873-876, March 18-23, 2005.
[10] H. H. Pang, K. L. Tan, and X. Zhou, “Steganographic schemes for file system and B-tree,” IEEE Transaction on Knowledge and Data Engineering, Vol. 16, No. 6, pp. 701-713, June 2004.
[11] http://www.spychecker.com/download/download_stools.html, visited as on March 28, 2009

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.