Abstract

In this paper a Z-transform based image authentication technique termed as IAZT has been proposed to authenticate gray scale images. The technique uses energy efficient and low bandwidth based invisible data embedding with a minimal computational complexity. Near about half of the bandwidth is required compared to the traditional Z–transform while transmitting the multimedia contents such as images with authenticating message through network. This authenticating technique may be used for copyright protection or ownership verification. Experimental results are computed and compared with the existing authentication techniques like Li’s method [11], SCDFT [13], Region-Based method [14] and many more based on Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Image Fidelity (IF), Universal Quality Image (UQI) and Structural Similarity Index Measurement (SSIM) which shows better performance in IAZT.

Highlights

  • In today’s digital world there is an enormous increase in the amount of multimedia content over internet such as image, video and audio materials

  • Digital devices may improve their performance by improving processor or memory unit but bandwidth becomes the major limitation for transferring huge digital data

  • In this paper IAZT, the issue of image coding with minimum calculation and less complexity with invisible watermarking is achieved

Read more

Summary

INTRODUCTION

In today’s digital world there is an enormous increase in the amount of multimedia content over internet such as image, video and audio materials Such materials are traverse through wire and unwired medium in a carryon fashion. The probability of pixel value changes decreases as compared to spatial domain Many transformation techniques such as DFT[1], DCT[2,9,10], DWT[3], Daubechies[15] and others are already implemented in digital world and widely used in steganography[4], data compression and many more. This paper proposed a frequency domain based technique where the digital content such as image is converted form spatial domain to Z-domain with a 2x2 sliding window based mask in a row major order to generate 2x2 real value and 2x2 imaginary value with less amount of computation and without the trigonometry complexity.

THE TECHNIQUE
Forward Z-Transformation
Inverse Z-Transformation
Traditional Z Transform
Fast Z-Transformation
Algorithm for Inverse Z-Transformation
Embedding Technique
Insertion
RESULTS AND DISCUSSIONS
Comparison of IAZT with Existing Techniques
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.