Abstract
The paper presents an image/legal-document authentication and secures message transmission technique by embedding message/image/message-digest into color images. Image authentication is done by embedding message/image within the image pixels of source image. Legal document authentication is done by embedding the authenticating image and self generated message digest (generated from signed document part) into the image part of the legal document. The position of insertion is chosen within each byte of source image using XOR operation between upper three bits of each source byte and k where k is any number from 0 to 7. Three bits of authenticating message/image/message-digest are embedded in each byte of source image. Fabrication process starts with the dimension of authenticating image followed by message digest (MD) and ends by embedding the content of authenticating message/image. To enhance the security further a layer has also been fabricated by XOR operation of the embedded image with another self generated MD key obtained from the source image. The decoding is done by applying the reverse algorithm. Experimental results are tested with the aid of Histogram analysis, noise analysis, standard deviation computation and PSNR, IF, MSE analysis of the source and embedded image and has been compared with popular existing steganographic algorithms like S-Tools where the proposed ATILD is capable to hide large volume of data than S-Tools and shows better performance. The proposed ATILD technique also shows high amount of sustainability against various attacks.
Similar content being viewed by others
References
Ghoshal, N., & Mandal, J. K. (2008). A novel technique for image authentication in frequency domain using discrete fourier transformation technique (IAFDDFTT). Malaysian Journal of Computer Science, ISSN 0127–9084, 21(1), 24–32.
Ghoshal, N., Mandal, J. K., et al. (2008). Masking based data hiding and image authentication technique (MDHIAT), Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM-2008, December 14–17th, Anna University, Chennai, India, pp. 119–122.
Radhakrishnan, R., Kharrazi, M., & Menon, N. (2005). Data masking: a new approach for steganography. Journal of VLSI Signal Processing, Springer, 41, 293–303.
EL-Emam, N. N. (2007). Hiding a large amount of data with high security using steganography algorithm. Journal of Computer Science ISSN 1549–3636, 3(4), 223–232.
Amin, P., Lue, N., & Subbalakshmi, K. (2005). Statistically secure digital image data hiding, (pp. 1–4). IEEE Multimedia Signal Processing MMSP05, Shanghai, China, Oct. 2005.
Chen, B., & Wornnel, G. W. (2001). Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4), 1423–1443.
Chandramouli, R., & Memon, N. (2001). Analysis of LSB based image steganography techniques, (pp. 1019–1022). Proc. of ICIP, Thissaloniki, Greece.
Lin, C. Y., & Chang, S. F. (1998). A robust image authentication method surviving JPEG lossy compression. Proceedings of SPIE, 3312, 296–307.
Dumitrescu, S., Xiaolin, W., & Wang, Z. (2003). Detection of LSB steganography via sample pair analysis. In LNCS, (vol. 2578, pp. 355–372). New York: Springer-Verlag
Moulin, P., & O’Sullivan, J. A. (2003). Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, 49(3), 563–593.
Pavan, S., Gangadharpalli, S., & Sridhar, V. (2005). Multivariate entropy detector based hybrid image registration algorithm, (pp. 18–23). IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, March 2005.
Pang, H. H., Tan, K. L., & Zhou, X. (2004). Steganographic schemes for file system and B-tree. IEEE Transactions on Knowledge and Data Engineering, 16, 701–713.
Moulin, P., & Mihcak, M. K. (2002). A framework for evaluating the data-hiding capacity of image sources. IEEE Transactions on Image Processing, 11, 1029–1042.
Rechberger, C., Rijman, V., & Sklavos, N. (2006). The NIST cryptographic workshop on hash functions. IEEE Security & Privacy, 4, 54–56.
Al-Hamami, A. H., & Al-Ani, S. A. (2005). A new approach for authentication technique. Journal of computer Science, ISSN 1549–3636, 1(1), 103–106.
S-Tools: http://digitalforensics.Champlain.Edu/download/stools4.zip.
Kutter, M., Voloshynovskiy, S., & Herrigel, A. (2000). The Watermark copy attack. In Security and watermarking of multimedia contest II, SPIE-3971, (pp. 371–380). San Josh, USA, Jan. 2000.
Ergun, F., Kilian, J., & Kumar, R. (1999). A note on the limits of collusion-resistant watermarks. In Eurocrypt 1999 (pp. 140–149, vol. 1592). LNCS, Springer Verlag.
Linnartz, J.-P. M. G., & Dijk, M. V. (1998). Analysis of the sensitivity attack against electronic watermarks in images. In workshop information hiding 1998 LNCS, (Vol. 1525, pp. 258–272). Springer Verlag.
Weber, A. G. (1997). The usc-sipi image database: http://sipi.usc.edu/services/database/Database.html, October 1997, Signal and Image Processing Institute at the University of Southern California.
Acknowledgement
The author expresses the deep sense of gratitude to the Dept. of Computer Sc. and Engg. & Dept. of Engineering and Technological Studies, University of Kalyani, where the work has been carried out.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ghoshal, N., Mandal, J.K. & Khamrui, A. An Authentication Technique for Image/Legal Document (ATILD). J Sign Process Syst 67, 187–199 (2012). https://doi.org/10.1007/s11265-010-0557-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11265-010-0557-7