The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper presents an image/legal-document authentication and secures message transmission technique by embedding message/image/message-digest into color images. Image authentication is done by embedding message/image within the image pixels of source image. Legal document authentication is done by embedding the authenticating image and self generated message digest (generated from signed document...
In this paper an efficient (2, 2) secret sharing scheme has been proposed where the generated shares are meaningful and the aspect ratio and image dimension of the shares remain constant with respect to the source image. In the CARVCMS, instead of generating new pixels for shares, the shares are generated by random inversion of the levels of the pixel values. The scheme is more secured and very easy...
In this paper a DCT based gray scale image authentication technique in frequency domain, termed as AINCDCT has been proposed. The cover image transformed into the spectral domain through 2 × 2 mask in row major order using nonconventional DCT, resulting corresponding frequency components. Higher frequency components having less energy, replaced by secret bits using secret key and a hash function....
Image steganography is the art of hiding information onto the cover image. In this paper a Genetic Algorithm based color image authentication/data hiding technique through steganographic approach, in frequency domain using Discrete Fourier Transform (DFT) termed as GASFD, has been proposed. 2×2 masks are taken from the source image in row major order where DFT is used to transform original image (cover...
This paper deals with a novel steganographic technique which demonstrates the colour image authentication technique in frequency domain based on the Discrete Fourier Transform (DFT). The DFT is applied on sub-image block called mask of size 2 × 2 for frequency components of corresponding spatial component. This transforms process done from beginning to end mask in row major order of the carrier image...
In this paper, an approach has been made to provide security to digital songs through embedding authenticating secret code from another strip of song signal into the original signal without changing its audible quality. Embedding secrete song into original signal is the first phase of the proposed technique followed by fabrication of authenticating code. The embedded unique secret audio is used to...
In this paper a DCT based steganographic technique in frequency domain, termed as SADCT has been proposed for authentication of color images. The cover image transformed into the time domain using 8×8 mask in row major order using DCT resulting its corresponding frequency components. Highest frequency values are fetched from red and green components of transformed RGB matrix as watermark. Using a...
This paper presents a new steganographic technique which demonstrates the colour image authentication process in frequency domain based on the Discrete Fourier Transformation (DFT). Image authentication is done by hiding secrete message/image into the transformed frequency component of source image. The DFT is applied on sub-image block called mask of size 2 × 2 in row major order. Secrete message/image...
The importance of identifying a song from similar songs is increasing with the growing importance of high quality editing and processing of audio signals. In this paper a novel technique to protect piracy of quality songs has been derived using amplitude manipulation. A technique to identify a particular song by enforcing authentication via amplitude manipulation has been developed based on sampled...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.