“…Many transformation techniques such as DFT [1], DCT [2], DWT [3] and others are already implemented in digital world and widely used in today's technique such as steganography [4], data compression and many more. This paper proposed a frequency domain based technique where the digital content such as image is converted form spatial domain to Z-domain using a 2x2 sliding window based mask in a row ate 2x2 real and 2x2 imaginary matrices through less amount of computation and without the trigonometric complexity.…”
Section: Computer Science and Information Technology (Cs And It)mentioning
In this paper a Z-transform based image coding technique has been proposed. The techniques uses energy efficient and low bandwidth based invisible data embedding with a minimal computational complexity. In this technique near about half the bandwidth is required compared to the traditional Z-transform while transmitting the multimedia content such as images through network.
KEYWORDS
“…Many transformation techniques such as DFT [1], DCT [2], DWT [3] and others are already implemented in digital world and widely used in today's technique such as steganography [4], data compression and many more. This paper proposed a frequency domain based technique where the digital content such as image is converted form spatial domain to Z-domain using a 2x2 sliding window based mask in a row ate 2x2 real and 2x2 imaginary matrices through less amount of computation and without the trigonometric complexity.…”
Section: Computer Science and Information Technology (Cs And It)mentioning
In this paper a Z-transform based image coding technique has been proposed. The techniques uses energy efficient and low bandwidth based invisible data embedding with a minimal computational complexity. In this technique near about half the bandwidth is required compared to the traditional Z-transform while transmitting the multimedia content such as images through network.
KEYWORDS
“…Image hashing techniques use data from different domains such as DCT coefficients [5], Wavelet transform coefficients [19] and Fourier transform coefficients [13], [15], Daubechies wavelet transform [3] to generate the signature for image authentication. A digital signature is an encrypted form of the whole data generated from original data.…”
Section: Introductionmentioning
confidence: 99%
“…The image data are transformed to frequency domain with help of sub matrix of 2x2 size of host image. The MD-5 is used to generate 128 bits Message Digest [13]. H.B.Kekre et al have illustrated an image hashing scheme using CBIR and hamming distance.…”
Authentication is one of the image security issues solved by hash function and another one issue is providing security for illegal manipulation of digital image is solved by an encryption. An optimized hybrid image security mechanism for authentication and secrecy of images by means of Particle Swarm Optimization (PSO) in daubechies4 transform is illustrated in this paper. This mechanism provide solutions to the issues such as authentication, robustness, security and statistical attacks. The PSO technique is employed to select feature vectors to form the image hash and select high energy coefficients for partial encryption. The shuffling of bits , coefficients and blocks of an image is performed by interweaving technique. The Completeness of Signature (CoS) is used to recognize the image as authentic or unauthentic. The image quality distortion is computed with help of image quality index metric(IQIM) with respect to three factors namely loss of correlation, luminance distortion, and contrast distortion. The experimental results are computed with respect to CoS, IQIM, PSNR and correlation coefficient andpresented to demonstrate the efficacy of the proposed scheme.
“…Many transformation techniques such as DFT [1], DCT [2,9,10], DWT [3], Daubechies [15] and others are already implemented in digital world and widely used in steganography [4], data compression and many more. This paper proposed a frequency domain based technique where the digital content such as image is converted form spatial domain to Z-domain with a 2x2 sliding window based mask in a row major order to generate 2x2 real value and 2x2 imaginary value with less amount of computation and without the trigonometry complexity.…”
In this paper a Z-transform based image authentication technique termed as IAZT has been proposed to authenticate gray scale images. The technique uses energy efficient and low bandwidth based invisible data embedding with a minimal computational complexity. Near about half of the bandwidth is required compared to the traditional Z-transform while transmitting the multimedia contents such as images with authenticating message through network. This authenticating technique may be used for copyright protection or ownership verification. Experimental results are computed and compared with the existing authentication
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.