The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2008
DOI: 10.22452/mjcs.vol21no1.3
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Technique for Image Authentication in Frequency Domain Using Discrete Fourier Transformation Technique (IAFDDFTT)

Abstract: In this paper a novel technique for Image Authentication in Frequency Domain using Discrete Fourier

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…Many transformation techniques such as DFT [1], DCT [2], DWT [3] and others are already implemented in digital world and widely used in today's technique such as steganography [4], data compression and many more. This paper proposed a frequency domain based technique where the digital content such as image is converted form spatial domain to Z-domain using a 2x2 sliding window based mask in a row ate 2x2 real and 2x2 imaginary matrices through less amount of computation and without the trigonometric complexity.…”
Section: Computer Science and Information Technology (Cs And It)mentioning
confidence: 99%
“…Many transformation techniques such as DFT [1], DCT [2], DWT [3] and others are already implemented in digital world and widely used in today's technique such as steganography [4], data compression and many more. This paper proposed a frequency domain based technique where the digital content such as image is converted form spatial domain to Z-domain using a 2x2 sliding window based mask in a row ate 2x2 real and 2x2 imaginary matrices through less amount of computation and without the trigonometric complexity.…”
Section: Computer Science and Information Technology (Cs And It)mentioning
confidence: 99%
“…Image hashing techniques use data from different domains such as DCT coefficients [5], Wavelet transform coefficients [19] and Fourier transform coefficients [13], [15], Daubechies wavelet transform [3] to generate the signature for image authentication. A digital signature is an encrypted form of the whole data generated from original data.…”
Section: Introductionmentioning
confidence: 99%
“…The image data are transformed to frequency domain with help of sub matrix of 2x2 size of host image. The MD-5 is used to generate 128 bits Message Digest [13]. H.B.Kekre et al have illustrated an image hashing scheme using CBIR and hamming distance.…”
Section: Introductionmentioning
confidence: 99%
“…Many transformation techniques such as DFT [1], DCT [2,9,10], DWT [3], Daubechies [15] and others are already implemented in digital world and widely used in steganography [4], data compression and many more. This paper proposed a frequency domain based technique where the digital content such as image is converted form spatial domain to Z-domain with a 2x2 sliding window based mask in a row major order to generate 2x2 real value and 2x2 imaginary value with less amount of computation and without the trigonometry complexity.…”
Section: Introductionmentioning
confidence: 99%