{"title":"基于块的图像认证框架(FBIA)","authors":"N. Ghoshal, J. K. Mandal, A. Khamrui","doi":"10.1109/ICIINFS.2009.5429840","DOIUrl":null,"url":null,"abstract":"This study deals with devising and implementing a novel technique for image authentication and secured message transmission based on hiding large volume of data into gray scale images. Image authentication is done by embedding message / image in spatial domain by choosing image blocks of size 3 × 3 from the source image in row major order. Three bits of authenticating message /image/message-digest are fabricated within each source image byte of each image block where the position is chosen randomly using a hash function b7b6b5 ⨁k where b7, b6, b5 are higher order three bits of each source image byte and k is an integer number varies from 0 to 7, and the process is repeated for the whole image. The dimension of authenticating image followed by message digest (MD) and the content of authenticating message/image are also embedded. To enhance the security a layer has also been fabricated by XOR operation of the embedded image with a self generated MD obtained from the source image. Reverse process is applied for decoding. The results have been tested through histogram analysis, noise analysis and standard deviation computation of the source image with the embedded image and compared with popular existing steganographic algorithms like S-Tools. It is seen that the proposed FBIA is capable to embed more information than S-Tools with better fidelity.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A framework for block based image authentication (FBIA)\",\"authors\":\"N. Ghoshal, J. K. Mandal, A. Khamrui\",\"doi\":\"10.1109/ICIINFS.2009.5429840\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study deals with devising and implementing a novel technique for image authentication and secured message transmission based on hiding large volume of data into gray scale images. Image authentication is done by embedding message / image in spatial domain by choosing image blocks of size 3 × 3 from the source image in row major order. Three bits of authenticating message /image/message-digest are fabricated within each source image byte of each image block where the position is chosen randomly using a hash function b7b6b5 ⨁k where b7, b6, b5 are higher order three bits of each source image byte and k is an integer number varies from 0 to 7, and the process is repeated for the whole image. The dimension of authenticating image followed by message digest (MD) and the content of authenticating message/image are also embedded. To enhance the security a layer has also been fabricated by XOR operation of the embedded image with a self generated MD obtained from the source image. Reverse process is applied for decoding. The results have been tested through histogram analysis, noise analysis and standard deviation computation of the source image with the embedded image and compared with popular existing steganographic algorithms like S-Tools. It is seen that the proposed FBIA is capable to embed more information than S-Tools with better fidelity.\",\"PeriodicalId\":117199,\"journal\":{\"name\":\"2009 International Conference on Industrial and Information Systems (ICIIS)\",\"volume\":\"05 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Industrial and Information Systems (ICIIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIINFS.2009.5429840\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Industrial and Information Systems (ICIIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIINFS.2009.5429840","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A framework for block based image authentication (FBIA)
This study deals with devising and implementing a novel technique for image authentication and secured message transmission based on hiding large volume of data into gray scale images. Image authentication is done by embedding message / image in spatial domain by choosing image blocks of size 3 × 3 from the source image in row major order. Three bits of authenticating message /image/message-digest are fabricated within each source image byte of each image block where the position is chosen randomly using a hash function b7b6b5 ⨁k where b7, b6, b5 are higher order three bits of each source image byte and k is an integer number varies from 0 to 7, and the process is repeated for the whole image. The dimension of authenticating image followed by message digest (MD) and the content of authenticating message/image are also embedded. To enhance the security a layer has also been fabricated by XOR operation of the embedded image with a self generated MD obtained from the source image. Reverse process is applied for decoding. The results have been tested through histogram analysis, noise analysis and standard deviation computation of the source image with the embedded image and compared with popular existing steganographic algorithms like S-Tools. It is seen that the proposed FBIA is capable to embed more information than S-Tools with better fidelity.