Invisible Image Watermarking Using Z Transforms (IIWZT) | SpringerLink
Skip to main content

Invisible Image Watermarking Using Z Transforms (IIWZT)

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 177))

Abstract

This paper presents an invisible image watermarking technique in frequency domain through Z transform, with a hiding capacity of 1.5 bpB (1.5 bits per byte). Z(rejω) is a complex variable comes from Laplace transformation has two parameters, r denotes radius of Region of convergence and ω denotes angle respectively. In this technique (2 *2 ) sub matrix is taken from source image and converted into 1-diamensional (1*4) array which undergoes Z-transform with a is set of angular frequency(ω). 2 bits of secret message is embedded including the complex conjugate pair where multiple embedding is done. First co efficient is used for tuning purpose and not embedding for information. This process is repeated until exhaustion of secret image. Inverse Z transform is done at end to convert the image from frequency domain to spatial domain. Experimental result shows good PSNR and image fidelity which analytically suggest that the proposed scheme obtains better secrecy with improved fidelity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 34319
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 42899
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Yu, L., et al.: Improved Adaptive LSB steganography based on Chaos and Genetic Algorithm. EURASIP Journal on Advances in Signal Processing 2010, Article ID 876946 (2010)

    Google Scholar 

  2. Ghoshal, N., Mandal, J.K., et al.: Image Authentication by Hiding Large Volume of Data and Secure Message Transmission Technique using Mask (IAHLVDSMTTM). In: Proceedings of IEEE International Advanced Computing Conference IACC 2009, March 6-7. Thapar University, Patiala (2009) ISBN:978-981-08-2465-5

    Google Scholar 

  3. Ghoshal, N., Mandal, J.K., et al.: Masking based Data Hiding and Image Authentication Technique (MDHIAT). In: Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM 2008, Anna University, December 14-17 (2008) ISBN: 978-1-4244-2962-2

    Google Scholar 

  4. Ghoshal, N., Mandal, J.K.: A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDZTT). Malaysian Journal of Computer Science 21(1), 24–32 (2008) ISSN 0127-9094

    Google Scholar 

  5. Ghoshal, N., Mandal, J.K.: A Bit Level Image Authentication/Secrete Message Transmission Technique (BLIA/SMTT). Association for the Advancement of Modeling and Simulation Technique in Enterprises (AMSE), AMSE Journal of Signal Processing and Pattern Recognition 51(4), 1–13 (2008)

    Google Scholar 

  6. EL-Emam, N.N.: Hiding a large Amount of data with High Security Using Steganography Algorithm. Journal of Computer Science 3(4), 223–232 (2007) ISSN 1549-3636

    Article  Google Scholar 

  7. Chang, C.-C., Lin, C.-C., Tseng, C.-S., Tai, W.-L.: Reverssible hiding in DCT based Compressed image (received July 19, 2005), www.scincedirect.com (received in revised form February 15, 2007; accepted February 15, 2007)

  8. Mitra, S.K.: Digital Signal Processing, 3rd edn. TATA McGraw-Hill,

    Google Scholar 

  9. Dumitrescu, S., Xiaolin, W., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. on Signal Processing 51(7), 1995–2007 (2003)

    Article  Google Scholar 

  10. Chandramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. In: Proc. of ICIP, Thissaloniki, Greece, pp. 1019–1022 (2001)

    Google Scholar 

  11. Wang, R.-Z., Lib, C.-F., Lin, J.-C.: Image hiding by optimal LSB substitution and Genetic algorithm. In: 2001 Pattern Recognition Society. Elsevier Science Ltd (2001)

    Google Scholar 

  12. Lin, C.Y., Chang, S.F.: A robust image authentication method surviving JPEG lossy compression. In: Proc. SPIE, San Jose, vol. 3312, pp. 296–307 (January 1998)

    Google Scholar 

  13. Weber, A.G.: The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering, http://sipi.usc.edu/database/ (last accessed on January 20, 2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. K. Mandal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mandal, J.K., Kanji, R. (2013). Invisible Image Watermarking Using Z Transforms (IIWZT). In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31552-7_81

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31552-7_81

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31551-0

  • Online ISBN: 978-3-642-31552-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics