CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Image Contents Verification Algorithm using Transform Domain Techniques

by S. S. Nassar, N. M. Ayad, H. M. Kollash, O. S. Faragallah, M. A. M. El-bendary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 9
Year of Publication: 2014
Authors: S. S. Nassar, N. M. Ayad, H. M. Kollash, O. S. Faragallah, M. A. M. El-bendary
10.5120/17032-7333

S. S. Nassar, N. M. Ayad, H. M. Kollash, O. S. Faragallah, M. A. M. El-bendary . Image Contents Verification Algorithm using Transform Domain Techniques. International Journal of Computer Applications. 97, 9 ( July 2014), 1-8. DOI=10.5120/17032-7333

@article{ 10.5120/17032-7333,
author = { S. S. Nassar, N. M. Ayad, H. M. Kollash, O. S. Faragallah, M. A. M. El-bendary },
title = { Image Contents Verification Algorithm using Transform Domain Techniques },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 9 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number9/17032-7333/ },
doi = { 10.5120/17032-7333 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:23:37.514393+05:30
%A S. S. Nassar
%A N. M. Ayad
%A H. M. Kollash
%A O. S. Faragallah
%A M. A. M. El-bendary
%T Image Contents Verification Algorithm using Transform Domain Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 9
%P 1-8
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid growth of digital multimedia and Internet technologies has made data security as an important issue in digital world. Encryption techniques are used to achieve data confidentiality, and this paper proposes a novel integrity verification method for images during transit. The confidential image is first divided into dedicated number of blocks; a discrete transform domain algorithm is used to embed a block based mark of the same image in another block according to a specific algorithm. In this work, the popular discrete transform domains, such as the discrete cosine transform (DCT), discrete Fourier transforms (DFT), and discrete wavelet transform (DWT) are examined individually. Different image analyses and comparisons are verified to examine the suitability of proposed algorithm with these domains. The discrete cosine transform (DCT) proved to be more efficient transform domain used with the proposed scheme. Higher sensitivity to simple modifications makes proposed scheme more applicable tool for image integrity verification with hyper secure data transformations such military and nuclear applications.

References
  1. Zhou, H. , H. Li, et al. "Semi-fragile Watermarking Technique for Image Tamper Localization. "International Conference on Measuring Technology and Mechatronics Automation, 2009 519-523.
  2. E. T. Lin, and E. J. Delp (1999), "A review of fragile image watermarks", In Proceedings of the ACM multimedia and security workshop, pp. 25–29.
  3. R. Petrovic,"Digital Watermarks for Audio Integrity Verification", Serbia and Montenegro, Nis, September 2005 28-30.
  4. W. H. Chang and L. W. Chang,"Semi-Fragile Watermarking for Image Authentication, Localization, and Recovery Using Tchebichef Moments", Communications and Information Technologies (ISCIT), 2010.
  5. S. Radharani, M. L. Valarmathi (2010), "A study of watermarking scheme for image authentication", International Journal of Computer Applications, Vol. 2, No. 4, pp. 24-32.
  6. C. -T. Li, and F. -M. Yang (2003), "One-dimensional neighborhood forming strategy for fragile watermarking", Journal of Electronic Imaging, Vol. 12, No. 2, pp. 284-291.
  7. W. C. Chen, and M. S. Wang (2009), "A Fuzzy c-Means Clustering based Fragile Watermarking Scheme for Image Authentication", Expert Systems with Applications, Volume 36, Issue 2, Part 1, pp. 1300-1307.
  8. Ankan Bhattacharya, Sarbani Palit, Nivedita Chatterjee, and Gourav Roy (2011), "Blind assessment of image quality employing fragile watermarking", 7th International Sym. on Image and Signal Processing and Analysis (ISPA 2011) Dubrovnik, Croatia, pp. 431-436.
  9. R. B. Wolfgang and E. J. Delp, A Watermark for Digital Images", IEEE Proc. of ICIP, Laussane, Switzerland, Oct 1996.
  10. M. j. Tsai and C. C Chien,"A Wavelet-Based Semi-Fragile Watermarking with Recovery Mechanism", IEEE International Symposium on Circuits and Systems, May 2008pp. 3033-3036.
  11. D. Zhang and Z. Pan, "A contour-based semi-fragile image watermarking algorithm in DWT domain," Proc. ETCS vol. 3, 2010, pp. 228-231.
  12. K. Maeno, S. Qibin, S. F. Chang and M. Suto "New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization". IEEE Trans Multimedia;8(1) 2006:32–45
  13. X. Wang, "A novel adaptive semi-fragile watermarking scheme based on image content," ACTA AUTOMATICA SINICA vol. 33, no. 4, 2007 pp. 361-366.
  14. C. Shoemaker, Rudko, "Hidden Bits: A Survey of Techniques for Digital Watermarking" Independent StudyEER-290 Prof Rudko, Spring 2002.
  15. A. H. Tewfik " Digital watermarking ", San Mercury News, 14 August , 2000.
  16. H. R. Myler "Image Transforms",http://ee. lamar. edu/gleb/dip/03%20-%20Image%20Transforms. pdf, April 2002.
  17. K. B. ShivaKumar,K. B. Raja, R. K. Chhotaray, SabyasachiPattnaik, "Coherent Steganography using Segmentation and DCT",IEEE-978-1-4244-5967-4/10/$26. 00 ©2010.
  18. C. Shoemaker, Rudko, "Hidden Bits: A Survey of Techniques for Digital Watermarking" Independent StudyEER-290 Prof Rudko, Spring 2002.
  19. Sumathi Poobal, G. Ravindran,"The Performance of Fractal Image Compression on Different Imaging Modalities Using Objective Quality Measures," International Journal of Engineering Science and Technology (IJEST), Vol. 2, Issue 1, Jan-Feb 2011, pp 239-246.
Index Terms

Computer Science
Information Sciences

Keywords

Information security Integrity Image verification Authentication Digital Watermarking DCT DFT DWT MSE PSNR Correlation Noise