Abstract
This paper presents an invisible image watermarking technique in frequency domain through Z transform, with a hiding capacity of 1.5 bpB (1.5 bits per byte). Z(rejω) is a complex variable comes from Laplace transformation has two parameters, r denotes radius of Region of convergence and ω denotes angle respectively. In this technique (2 *2 ) sub matrix is taken from source image and converted into 1-diamensional (1*4) array which undergoes Z-transform with a is set of angular frequency(ω). 2 bits of secret message is embedded including the complex conjugate pair where multiple embedding is done. First co efficient is used for tuning purpose and not embedding for information. This process is repeated until exhaustion of secret image. Inverse Z transform is done at end to convert the image from frequency domain to spatial domain. Experimental result shows good PSNR and image fidelity which analytically suggest that the proposed scheme obtains better secrecy with improved fidelity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Yu, L., et al.: Improved Adaptive LSB steganography based on Chaos and Genetic Algorithm. EURASIP Journal on Advances in Signal Processing 2010, Article ID 876946 (2010)
Ghoshal, N., Mandal, J.K., et al.: Image Authentication by Hiding Large Volume of Data and Secure Message Transmission Technique using Mask (IAHLVDSMTTM). In: Proceedings of IEEE International Advanced Computing Conference IACC 2009, March 6-7. Thapar University, Patiala (2009) ISBN:978-981-08-2465-5
Ghoshal, N., Mandal, J.K., et al.: Masking based Data Hiding and Image Authentication Technique (MDHIAT). In: Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM 2008, Anna University, December 14-17 (2008) ISBN: 978-1-4244-2962-2
Ghoshal, N., Mandal, J.K.: A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDZTT). Malaysian Journal of Computer Science 21(1), 24–32 (2008) ISSN 0127-9094
Ghoshal, N., Mandal, J.K.: A Bit Level Image Authentication/Secrete Message Transmission Technique (BLIA/SMTT). Association for the Advancement of Modeling and Simulation Technique in Enterprises (AMSE), AMSE Journal of Signal Processing and Pattern Recognition 51(4), 1–13 (2008)
EL-Emam, N.N.: Hiding a large Amount of data with High Security Using Steganography Algorithm. Journal of Computer Science 3(4), 223–232 (2007) ISSN 1549-3636
Chang, C.-C., Lin, C.-C., Tseng, C.-S., Tai, W.-L.: Reverssible hiding in DCT based Compressed image (received July 19, 2005), www.scincedirect.com (received in revised form February 15, 2007; accepted February 15, 2007)
Mitra, S.K.: Digital Signal Processing, 3rd edn. TATA McGraw-Hill,
Dumitrescu, S., Xiaolin, W., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. on Signal Processing 51(7), 1995–2007 (2003)
Chandramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. In: Proc. of ICIP, Thissaloniki, Greece, pp. 1019–1022 (2001)
Wang, R.-Z., Lib, C.-F., Lin, J.-C.: Image hiding by optimal LSB substitution and Genetic algorithm. In: 2001 Pattern Recognition Society. Elsevier Science Ltd (2001)
Lin, C.Y., Chang, S.F.: A robust image authentication method surviving JPEG lossy compression. In: Proc. SPIE, San Jose, vol. 3312, pp. 296–307 (January 1998)
Weber, A.G.: The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering, http://sipi.usc.edu/database/ (last accessed on January 20, 2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mandal, J.K., Kanji, R. (2013). Invisible Image Watermarking Using Z Transforms (IIWZT). In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31552-7_81
Download citation
DOI: https://doi.org/10.1007/978-3-642-31552-7_81
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31551-0
Online ISBN: 978-3-642-31552-7
eBook Packages: EngineeringEngineering (R0)