SlideShare a Scribd company logo
1 of 8
Download to read offline
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013
DOI : 10.5121/ijma.2013.5405 67
BINOMIAL TRANSFORM BASED IMAGE
AUTHENTICATION (BTIA)
S. K.Ghosal1
and J. K. Mandal2
1
Department of Computer Science and Engineering, Greater Kolkata College of
Engineering & Management, Baruipur, West Bengal, India
sudipta.ghosal@gmail.com
2
Department of Computer Science and Engineering, Kalyani University, Kalyani,
West Bengal, India
jkm.cse@gmail.com
ABSTRACT
In this paper, a fragile watermarking technique based on Binomial transform (BT) has been proposed for
color image authentication (BTIA). An initial adjustment is applied to adjust the pixel values. The Binomial
transform (BT) is applied to convert each pair of pixel components into transform domain in row major
order. Two bits of the authenticating watermarks, starting from the least significant bit position are
embedded into each component of transformed pair. A post-embedding adjustment has also been
incorporated to keep the embedded component values closest to the original without hampering the
embedded watermark bits. The inverse Binomial transform (IBT) is applied on each adjusted pair to re-
generate the pixel components which successively produce the watermarked image. At the receiving end,
the whole watermark can be extracted by the reverse procedure which can be verified for authentication by
obtaining a message digest. Experimental results conform that the proposed technique offers a higher
payload and PSNR over existing techniques [7, 9].
KEYWORDS
BTIA, BT, IBT, Payload, PSNR and Watermarked image.
1. INTRODUCTION
Security of digital information in the form of text, audio, video etc. is become an important issue
for today’s world. Digital media can be protected through different schemes like cryptography,
steganography, watermarking etc. Digital watermarking is an idea of fabricating secret
information into the carrier/cover media such as image, audio and video etc. for ownership
evidence, fingerprinting, authentication and integrity verification. The objective of this paper is to
authenticate a carrier image through a fragile watermarking technique where Binomial transform
has been introduced for embedding purpose.
Various transformations are applied on the carrier image to convert it from spatial domain into
transform domain for authentication. Some popular transform domain technique includes
Quaternion Fourier Transformation (QFT) [1], discrete cosine transformation (DCT) [2], discrete
wavelet transformation (DWT) [3], or discrete Fourier transform (DFT) [4] based watermarking
where the transformed components are used to fabricate the secret data. Transformed components
are modified slightly to embed the secret data while the watermarked image can be obtained by
applying the respective inverse transformation on the modified components.
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013
68
The effectiveness of various watermarking techniques can be measured in terms of payload, peak
signal to noise ratio and image fidelity etc. In this regard, the Binomial transform [5-6] is an
excellent choice for embedding watermark information. In [7], a Binomial transform based fragile
watermarking technique is applied on each 2 x 2 image block where a 128 bit message digest is
used for authentication purpose. The existing method [7] can be improvised by applying the
Binomial transform on a pair of pixel components instead over a 2 x 2 pixel block. As a result, the
payload can be enhanced significantly and the quality degradation becomes minimal. On
embedding authenticating watermark (message/image) bits, inverse Binomial transformation is
applied to re-generate the watermarked image in spatial domain.
The binomial transform (BT) is applied on pixel components {an} to generate transformed
components {sn} using equation (1).
(1)
Similarly, the inverse Binomial transform (IBT) is used to convert back the transformed
components into pixel domain using equation (2).
(2)
The main objective of proposed technique emphasizes on color image authentication by
protecting secret watermark. The message digest MD (which is generated from watermark data)
is used for authentication by verifying the integrity of the carrier image.
Section 2 and 3 of the paper discussed the formulation of the Binomial transform for a pair of
pixel components and the proposed technique. Results, comparison and analysis are given in
section 4. Conclusions are drawn in section 5. References are given at end.
2.TRANSFORMATION TECHNIQUES
The formulation can be derived by transforming each pair of pixel components (ai, ai+1) into a pair
of transformed components (si, si+1) using the Binomial transform (BT) given in equation (3).
si = ai
si+1 = ai - ai+1 (3)
where si and si+1 represents the pair of transformed components corresponding to the pixel
components ai and ai+1.
Similarly, by applying the inverse Binomial transform (IBT), each pair of transformed
components (si, si+1) are converted back into the spatial domain which consists of pixel
components ai and ai+1 as per equation (4).
ai = si
ai+1 = si - si+1 (4)
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013
69
3. PROPOSED TECHNIQUE
In this paper, a novel watermarking technique has been proposed based on the Binomial
transform (BT) for color images. A message digests (MD), content of the watermark and the
watermark size are embedded using the proposed technique. Each pair of pixel components of the
carrier image is pre-processed for an initial adjustment, if necessary. The initial adjustment sets a
new upper limit (i.e., 248) and a lower limit (i.e., 8) for a pixel component. This pre-embedding
pixel adjustment strategy ensures that the pixel values on embedding the watermark must lie
within the valid range (0 ≤ p ≤ 255). The Binomial transform (BT) is used to convert each pair of
pixel components into transformed components in row major order. Each component of a
transformed pair is capable of hiding two bits of the authenticating watermark starting from the
least significant bit position (LSB-0). A post-embedding adjustment has been incorporated to
keep the embedded transformed components closest to the original without hampering the
fabricated watermark bits. The inverse Binomial transform (IBT) is applied on each adjusted
components to produce the watermarked image in spatial domain. This process is continued till
the last pixel pair of the carrier/cover image in a row major order. The authorized recipient
extracts the watermark from the watermarked image through reverse process and new message
digest (MD') are obtained from the extracted watermark bits. The same is compared with
extracted message digests (MD) at the destination end for authentication.
Consider three pairs of pixel components corresponding to red, green and blue channels from a
given cover/carrier image. Binomial transform (BT) is applied on each pair of pixel components
to convert it into transformed components. Let, the three pair of pixel components are R1, G1 and
B1. The steps are as follows:
R1={164,63}, G1={253,57}, B1={71,5}
On initial adjustment, the pairs of pixel components become:
R1={164,63}, G1={248,57}, B1={71,8}
Applying Binomial transforms (BT) on each pair of pixel components, the obtained pairs of
transformed components are as here under:
TR1={164,101}, TG1={248,191}, TB1={71,63}
Now, if we embed the binary stream of 010001110100 using the proposed technique, the
embedded components pairs becomes:
ETR1={165,100}, ETG1={249,191}, ETB1={69,60}
The transformed adjustment method ensures that the bits which are not taking part in
embedding can form a set of patterns of 0’s and 1’s followed by the fabricated bits. Consequently,
the value closest to the original transformed component is chosen from all the possible
combinations. So, after adjusted components are as here under:
AETR1={165,100}, AETG1={249,191}, AETB1={69,64}
Again, by applying inverse Binomial transform (IBT) on each pair of transformed
components, the obtained pairs of pixel components are as shown below:
F-1
AETR1={165,65}, F-1
AETG1={249,58}, F-1
AETB1={69,5}
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013
70
The process of embedding is repeated for each pair of pixel components and continued till the end
of authenticating watermark bits. This section has been categorized into two parts namely the
algorithm for insertion and the algorithm for extraction.
3.1. Insertion
Initially, each pixel component pair are pre-adjusted, if necessary and then converted into the pair
of transformed components corresponding to red, green and blue channels based on Binomial
transforms (BT). Each transformed component (R/G/B) can fabricate two bits at the least two
significant bit positions (LSB-0 and LSB-1). A post-embedded processing has been incorporated
to adjust the transformed components without hampering the embedded bits. Inverse Binomial
transform (IBT) converts each pair of embedded as well as adjusted components into the pair of
pixel components which in succession produces the final watermarked image.
Algorithm:
Input: The 128 bits message digest MD derived from the authenticating watermark, the
carrier/cover image (I) and an authenticating watermark (message/image).
Output: The watermarked image (I′).
Methods: The Binomial transform (BT) is used to fabricate the watermark (along with a message
digest) into the carrier images by converting the image from spatial domain into transform
domain. Embedding bits in transform domain offers high robustness and improved security. The
detailed steps of embedding are as follows:
Steps:
1) A 128 bits message digest (MD) is obtained from the watermark to authenticate a color
image.
2) The size of the authenticating watermark (L) can be expressed by equation (5).
Wsize=[2 × {3 × (m × n)} – (MD + L)] (5)
where, the number of bits embedded per byte is 2, MD and L are the message digest
and dimension of the authenticating watermark for the m x n color image. The dimension
L consists of 32 bits of which 16 bits for width and remaining 16 bits for height.
3) Read authenticating watermark message/image and perform the operations given
below:
• The carrier/host image (I) is partitioned into pair of pixel components namely pj,
pi+1 in row major order.
• For each channel (Red/Green/Blue), reset the upper and lower limit of pixel
component (pc) to retain the value positive and less than, or equal to 255 before
embedding watermark bits. That means,
pc =
{248: pc ≥ 248
=
|8: pc ≤ 8 (6)
• Apply Binomial transform (BT) on each pair of pixel components to generate
transformed components pair consisting of components fi and fi+1.
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013
71
• Two bits of the authenticating watermark size, content and the message digests
are embedded in each transformed component of every transformed pair
starting from the least significant bit position (i.e., LSB-0).
[Embed authenticating watermark bits as per the above rules.]
• An adjustment has been incorporated to get transformed components closest to
the original without hampering the embedded bits. The adjustment has been
done by altering left most (T-3) bits followed by choosing the embedded
component value closest to the original one where T is the total number of bits
used to represent an embedded component.
• Apply inverse Binomial transform (IBT) on each pair of adjusted components
to re-generate the pixel components pair in spatial domain.
4) Repeat step 3 until and unless the whole authenticating watermark size, content and the
message digest MD is embedded. Successive pair of fabricated pixel pair produces the
watermarked image (I′).
5) Stop.
3.2. Extraction
The authenticated watermarked image is received in spatial domain. The Binomial transform
(BT) converts each pair of pixel components into transformed components. The watermark size,
contents and the embedded message digests (MD) are extracted from each transformed
component. A new message digest (MD') has been obtained from the extracted watermark which
in turn compared with the extracted message digests (MD) for authentication.
Algorithm:
Input: The watermarked image (I′) in spatial domain.
Output: The authenticating watermark image (W) and the message digest.
Methods: The Binomial transform (BT) is used to extract the watermark (along with a message
digest) from the watermarked image by converting the image from spatial domain to transform
domain. Successive extracted bits forms the watermark data and generate a message digest which
in turn used for authentication. The detailed steps of extraction are as follows:
Steps:
1) The watermarked image (I') is partitioned into pair of pixel components namely pj, pi+1 in
row major order.
2) Read each pair of transformed components and do the following operations:
• Apply Binomial transform (BT) on a pair of pixel components corresponding of
Red/Green/Blue channel, to generate transformed components pair consisting of
transformed components fi and fi+1.
• Two bits of the authenticating watermark size, content and the message digests
are extracted from each transformed component of every transformed pair
starting from the LSB-0.
[Extract authenticating message/image bit as per the above rules.]
• For each 8 (eight) bits extraction, it constructs one alphabet/one primary (R/G/B)
color component.
• Apply inverse Binomial transform (IBT) on each pair of transformed components
to convert back it into the spatial domain.
3) Repeat step 1 and 2 to complete decoding as per the size of the authenticating watermark.
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013
72
4) Obtain 128 bits message digest MD′ from the extracted watermark. Compare MD′ with
extracted MD. If both are same then the image is authorized, else unauthorized.
5) Stop.
4. RESULTS, COMPARISON AND ANALYSIS
Five different carrier/cover images [8] of dimension 512 × 512 are taken to incorporate the gold
coin (i.e. the authenticating watermark image). Images are labelled as: (i) Lena, (ii) Baboon, (iii)
Pepper, (iv) Earth and (v) Sailboat. On embedding the Gold-Coin image of (vi), the newly
generated watermarked image produces a good visual clarity and huge payload.
(i) Lena (ii) Baboon (iii) Pepper (iv) Earth (v) Sailboat (vi) Gold Coin
Figure 1. Different cover/carrier images of dimension 512 × 512 along with the watermark
It is seen from table 1 that the watermarked image has a peak to signal noise ratio (PSNR) of
around 42 dB in average case whereas the bits per byte (bpB) for a given carrier image is 2.
Table 1. Results of embedding of 195638 bytes of information into each carrier image of
dimension 512 x 512
Carrier Image Max. Payload
(byte)
PSNR IF bpB
Lena 196608 42.46 0.9998 2
Baboon 196608 42.46 0.9998 2
Pepper 196608 40.18 0.9995 2
Earth 196608 42.49 0.9998 2
Sailboat 196608 42.14 0.9998 2
AVG 196608 41.94 0.9997 2
Again, it is seen from table 2 that the PSNR and payload has been significantly improved in our
proposed technique over the Mandal and Ghosal’s existing technique [7] and Varsaki et al.’s [9]
method.
Table 2. Comparison of bpB and PSNR for proposed technique over Mandal and Ghosal’s [7] method and
Varsaki et. Al’s [9] method
Carrier
Images
Varsaki et al.’s
Method [9]
Mandal and Ghosal’s
technique [7]
Proposed Technique
bpB
(bits per
byte)
PSNR
(dB)
bpB
(bits per
byte)
PSNR
(dB)
bpB
(bits per
byte)
PSNR
(dB)
Lena 0.25 39.70 1.5 41.40 2 42.46
Baboon 0.25 30.69 1.5 42.05 2 42.46
Sailboat 0.25 35.28 1.5 41.67 2 42.14
AVG 0.25 35.22 1.5 41.70 2 42.35
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013
73
The standard deviation analysis for varying sizes over the ’Lena’ image is shown in figure 2. It
ensures that the change made into the watermarked image using our proposed technique is really
very minimal and almost identical to the original image.
Standard deviation analysis for'Lena' image using Mandal and
Ghosal's method [7] and the proposed method
45
45.5
46
46.5
47
47.5
48
64 x 64 128 x 128 256 x 256 512 x 512
Size of Image/Pixel
StandardDeviation
Original Image
Mandal and Ghosal's
technique[7]
Proposed Technique
Figure 2: Comparison of standard deviation between source and watermarked ‘Lena’ image using Mandal
and Ghosal’s method [7] and the proposed technique
In this authentication system, the recipient operate the authentication process by matching the
extracted message digest MD with the newly generated message digest MD', where MD' can be
obtained from the extracted watermark image. If the extracted message digest MD matches with
the newly generated message digest MD', then the authentication process is said to be successful,
otherwise, it is unauthorized.
The PSNR (Peak Signal to Noise Ratio) and NCC (Normalized Cross-correlation) values are
obtained from the watermarked images which is seen from table 3 by introducing attacks namely
‘Median Filtering’, ‘Speckle Noise’ and ‘Salt & Pepper Noise’. It also ensures that the qualities of
attacked watermarked images are still well perceptible but the message digest ensures that it is
tampered.
Table 3. Comparison of PSNR and NCC values of the watermarked images under different kind of attacks
Water-
marked
Images
PSNR NCC PSNR NCC PSNR NCC PSNR NCC
Before
attack
After Median
Filtering attack
( 3 x 3
neighbourhood)
After Speckle
Noise attack
(Variance =
0.001)
After Salt &
Pepper Noise
attack (Noise
Density=0.001)
Lena 42.46 0.9998 33.56 0.9968 34.38 0.9988 34.75 0.9987
Pepper 40.18 0.9995 31.56 0.9941 34.50 0.9985 33.82 0.9978
Sailboat 42.14 0.9998 28.49 0.9948 34.33 0.9988 34.49 0.9988
5. CONCLUSION
The proposed technique is an image authentication process in transform domain to enhance the
security compared to the existing algorithm. Authentication is done by embedding watermark
data in a carrier image. Using the technique two bits can be embedded in transformed
components. Experimental results conform that the proposed algorithm performs better than
existing techniques [7, 9].
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013
74
ACKNOWLEDGEMENT
The author expressed deep sense of gratitude to the PVRSE scheme of DST, Govt. of India
through which the experimental setup has been used for the research at the department of
computer science and engineering, University of Kalyani.
REFERENCES
[1] Pei S.C., Ding J.J., Chang J.H., “Efficient Implementation of Quaternion Fourier Transform,
Convolution, and Correlation by 2-D Complex FFT”, IEEE TRANSACTIONS ON SIGNAL
PROCESSING, VOL. 49, NO. 11, pp 27-83, 2001.
[2] N. Ahmed, T. Natarajan and K. R. Rao, “Discrete cosine transform,” IEEE Transactions on
Computers, Vol.C-23, pp.90-93, 1974.
[3] Rioul and P. Duhamel, “Fast algorithms for wavelet transforms,” IEEE Transaction on Information
Theory, Vol.38, No.2, pp.569-586, 1992.
[4] E. O. Brigham, “The fast Fourier transform,” Englewood Cliffs, NJ: Prentice-Hall, 1974.
[5] Borisov B. and Shkodrov V., Divergent Series in the Generalized Binomial Transform, Adv. Stud.
Cont. Math., 14 (1): 77-82, 2007.
[6] S. Falcon and A. Plaza, "Binomial transforms of the k-Fibonacci sequence", International Journal of
Nonlinear Sciences and Numerical Simulation 10(11-12): 1527-1538, 2009.
[7] Mandal, J. K., Ghosal S. K., “A Fragile Watermarking based on Binomial Transform in Color
Images”, Proceedings of Third International Conference on Computer Science & Information
Technology (CCSIT 2013), ISBN : 978-1-921987-00-7, Feb.18-20, 2013, Bangalore, India., DOI :
10.5121/csit.2013.3632, Volume 3, Number 6, 2013, pp. 281–288, 2013.
[8] Allan G. Weber, The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal
and Image Processing Institute, University of Southern California, Department of Electrical
Engineering. http://sipi.usc.edu/database/ (accessed on 25th January, 2010).
[9] Varsaki et al, “On the use of the discrete Pascal transform in hiding data in images”, “Optics,
Photonics, and Digital Technologies for Multimedia Applications”, Proc. of SPIE Vol. 7723, 77230L
• © 2010 SPIE • CCC code: 0277-786X/10/$18 • doi: 10.1117/12.854220, 2010.
Authors
Sudipta Kr Ghosal, Assistant Professor and Teacher in-charge of Computer Science &
Engineering department at Greater Kolkata College of Engineering & Management,
Kolkata. He received his bachelor of technology in Computer science and Engineering
in 2007. He received his master of technology in IT (Courseware Engineering) from
Jadavpur University, Kolkata, India in 2010. He is pursuing PhD in Color Image
Authentication from University of Kalyani, India under the supervision of Prof. J. K.
Mandal. Mr. Ghosal has around four years of experience in teaching and industry. He
has fifteen publications in the national and international conferences/journals.
Jyotsna Kumar Mandal, M. Tech.(Computer Science, University of Calcutta),
Ph.D.(Engg., Jadavpur University) in the field of Data Compression and Error
Correction Techniques, Professor in Computer Science and Engineering, University of
Kalyani, India. Life Member of Computer Society of India since 1992 and life member
of cryptology Research Society of India. Ex-Dean Faculty of Engineering, Teachnology
& Management, working in the field of Network Security, Steganography, Remote
Sensing & GIS Application, Image Processing. 26 years of teaching and research
experiences. Nine Scholars awarded Ph.D. one submitted and eight are pursuing. Total
number of publications is more than two hundred seventy seven in addition of
publication of five books from LAP Lambert, Germany.

More Related Content

What's hot

IRJET- Satellite Image Resolution Enhancement
IRJET- Satellite Image Resolution EnhancementIRJET- Satellite Image Resolution Enhancement
IRJET- Satellite Image Resolution EnhancementIRJET Journal
 
Analysis of various mcm algorithms for reconfigurable rrc fir filter
Analysis of various mcm algorithms for reconfigurable rrc fir filterAnalysis of various mcm algorithms for reconfigurable rrc fir filter
Analysis of various mcm algorithms for reconfigurable rrc fir filtereSAT Journals
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490IJRAT
 
Colorization of Greyscale Images Using Kekre’s Biorthogonal Color Spaces and ...
Colorization of Greyscale Images Using Kekre’s Biorthogonal Color Spaces and ...Colorization of Greyscale Images Using Kekre’s Biorthogonal Color Spaces and ...
Colorization of Greyscale Images Using Kekre’s Biorthogonal Color Spaces and ...Waqas Tariq
 
A High Performance Modified SPIHT for Scalable Image Compression
A High Performance Modified SPIHT for Scalable Image CompressionA High Performance Modified SPIHT for Scalable Image Compression
A High Performance Modified SPIHT for Scalable Image CompressionCSCJournals
 
A Robust Method for Image Watermarking Using Block Differencing LSB Substitution
A Robust Method for Image Watermarking Using Block Differencing LSB SubstitutionA Robust Method for Image Watermarking Using Block Differencing LSB Substitution
A Robust Method for Image Watermarking Using Block Differencing LSB SubstitutionIJERA Editor
 
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) cscpconf
 
Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)csandit
 
IRJET- Color Image Compression using Canonic Signed Digit and Block based...
IRJET-  	  Color Image Compression using Canonic Signed Digit and Block based...IRJET-  	  Color Image Compression using Canonic Signed Digit and Block based...
IRJET- Color Image Compression using Canonic Signed Digit and Block based...IRJET Journal
 
IRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature DescriptorIRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature DescriptorIRJET Journal
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...eSAT Publishing House
 
Implementation of BDDs by Various Techniques in Low Power VLSI Design
Implementation of BDDs by Various Techniques in Low Power VLSI DesignImplementation of BDDs by Various Techniques in Low Power VLSI Design
Implementation of BDDs by Various Techniques in Low Power VLSI Designidescitation
 

What's hot (20)

IRJET- Satellite Image Resolution Enhancement
IRJET- Satellite Image Resolution EnhancementIRJET- Satellite Image Resolution Enhancement
IRJET- Satellite Image Resolution Enhancement
 
Analysis of various mcm algorithms for reconfigurable rrc fir filter
Analysis of various mcm algorithms for reconfigurable rrc fir filterAnalysis of various mcm algorithms for reconfigurable rrc fir filter
Analysis of various mcm algorithms for reconfigurable rrc fir filter
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490
 
Kv3419501953
Kv3419501953Kv3419501953
Kv3419501953
 
Gd3111841188
Gd3111841188Gd3111841188
Gd3111841188
 
Colorization of Greyscale Images Using Kekre’s Biorthogonal Color Spaces and ...
Colorization of Greyscale Images Using Kekre’s Biorthogonal Color Spaces and ...Colorization of Greyscale Images Using Kekre’s Biorthogonal Color Spaces and ...
Colorization of Greyscale Images Using Kekre’s Biorthogonal Color Spaces and ...
 
A High Performance Modified SPIHT for Scalable Image Compression
A High Performance Modified SPIHT for Scalable Image CompressionA High Performance Modified SPIHT for Scalable Image Compression
A High Performance Modified SPIHT for Scalable Image Compression
 
Ba34321326
Ba34321326Ba34321326
Ba34321326
 
Ee34791794
Ee34791794Ee34791794
Ee34791794
 
A Robust Method for Image Watermarking Using Block Differencing LSB Substitution
A Robust Method for Image Watermarking Using Block Differencing LSB SubstitutionA Robust Method for Image Watermarking Using Block Differencing LSB Substitution
A Robust Method for Image Watermarking Using Block Differencing LSB Substitution
 
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
 
Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)
 
Ijcatr04051016
Ijcatr04051016Ijcatr04051016
Ijcatr04051016
 
IRJET- Color Image Compression using Canonic Signed Digit and Block based...
IRJET-  	  Color Image Compression using Canonic Signed Digit and Block based...IRJET-  	  Color Image Compression using Canonic Signed Digit and Block based...
IRJET- Color Image Compression using Canonic Signed Digit and Block based...
 
IRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature DescriptorIRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature Descriptor
 
paper573
paper573paper573
paper573
 
H010315356
H010315356H010315356
H010315356
 
Gv2512441247
Gv2512441247Gv2512441247
Gv2512441247
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...
 
Implementation of BDDs by Various Techniques in Low Power VLSI Design
Implementation of BDDs by Various Techniques in Low Power VLSI DesignImplementation of BDDs by Various Techniques in Low Power VLSI Design
Implementation of BDDs by Various Techniques in Low Power VLSI Design
 

Viewers also liked

SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAIN
SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAINSINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAIN
SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAINijma
 
Efficiency and capability of fractal image compression with adaptive quardtre...
Efficiency and capability of fractal image compression with adaptive quardtre...Efficiency and capability of fractal image compression with adaptive quardtre...
Efficiency and capability of fractal image compression with adaptive quardtre...ijma
 
SEGMENTATION AND CLASSIFICATION OF POINT CLOUDS FROM DENSE AERIAL IMAGE MATCHING
SEGMENTATION AND CLASSIFICATION OF POINT CLOUDS FROM DENSE AERIAL IMAGE MATCHINGSEGMENTATION AND CLASSIFICATION OF POINT CLOUDS FROM DENSE AERIAL IMAGE MATCHING
SEGMENTATION AND CLASSIFICATION OF POINT CLOUDS FROM DENSE AERIAL IMAGE MATCHINGijma
 
A SYSTEMATIC APPROACH TO AUTHENTICATE SONG SIGNAL WITHOUT DISTORTION OF GRANU...
A SYSTEMATIC APPROACH TO AUTHENTICATE SONG SIGNAL WITHOUT DISTORTION OF GRANU...A SYSTEMATIC APPROACH TO AUTHENTICATE SONG SIGNAL WITHOUT DISTORTION OF GRANU...
A SYSTEMATIC APPROACH TO AUTHENTICATE SONG SIGNAL WITHOUT DISTORTION OF GRANU...ijma
 
ANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGijma
 
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...ijma
 
A SIMPLE IMAGE PROCESSING APPROACH TO ABNORMAL SLICES DETECTION FROM MRI TUMO...
A SIMPLE IMAGE PROCESSING APPROACH TO ABNORMAL SLICES DETECTION FROM MRI TUMO...A SIMPLE IMAGE PROCESSING APPROACH TO ABNORMAL SLICES DETECTION FROM MRI TUMO...
A SIMPLE IMAGE PROCESSING APPROACH TO ABNORMAL SLICES DETECTION FROM MRI TUMO...ijma
 
Design and Development of an Image Based Plant Identification System Using Leaf
Design and Development of an Image Based Plant Identification System Using LeafDesign and Development of an Image Based Plant Identification System Using Leaf
Design and Development of an Image Based Plant Identification System Using Leafijma
 
SPEEDY OBJECT DETECTION BASED ON SHAPE
SPEEDY OBJECT DETECTION BASED ON SHAPESPEEDY OBJECT DETECTION BASED ON SHAPE
SPEEDY OBJECT DETECTION BASED ON SHAPEijma
 
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONSEXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONSijma
 
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...ijma
 
Development of a web based social networking system for self-management of di...
Development of a web based social networking system for self-management of di...Development of a web based social networking system for self-management of di...
Development of a web based social networking system for self-management of di...ijma
 
Image deblurring based on spectral measures of whiteness
Image deblurring based on spectral measures of whitenessImage deblurring based on spectral measures of whiteness
Image deblurring based on spectral measures of whitenessijma
 
Probabilistic model based image segmentation
Probabilistic model based image segmentationProbabilistic model based image segmentation
Probabilistic model based image segmentationijma
 
The influence of eyes and brain
The influence of eyes and brainThe influence of eyes and brain
The influence of eyes and brainijma
 
Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...ijma
 
Design of a virtual laboratory for analyzing nanoscale magnetic materials
Design of a virtual laboratory for analyzing nanoscale magnetic materialsDesign of a virtual laboratory for analyzing nanoscale magnetic materials
Design of a virtual laboratory for analyzing nanoscale magnetic materialsijma
 
Review of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsReview of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsijma
 
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONIMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONijma
 
Mini curso marxismo e ecologia
Mini curso marxismo e ecologiaMini curso marxismo e ecologia
Mini curso marxismo e ecologiaajr_tyler
 

Viewers also liked (20)

SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAIN
SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAINSINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAIN
SINGLE IMAGE SUPER RESOLUTION IN SPATIAL AND WAVELET DOMAIN
 
Efficiency and capability of fractal image compression with adaptive quardtre...
Efficiency and capability of fractal image compression with adaptive quardtre...Efficiency and capability of fractal image compression with adaptive quardtre...
Efficiency and capability of fractal image compression with adaptive quardtre...
 
SEGMENTATION AND CLASSIFICATION OF POINT CLOUDS FROM DENSE AERIAL IMAGE MATCHING
SEGMENTATION AND CLASSIFICATION OF POINT CLOUDS FROM DENSE AERIAL IMAGE MATCHINGSEGMENTATION AND CLASSIFICATION OF POINT CLOUDS FROM DENSE AERIAL IMAGE MATCHING
SEGMENTATION AND CLASSIFICATION OF POINT CLOUDS FROM DENSE AERIAL IMAGE MATCHING
 
A SYSTEMATIC APPROACH TO AUTHENTICATE SONG SIGNAL WITHOUT DISTORTION OF GRANU...
A SYSTEMATIC APPROACH TO AUTHENTICATE SONG SIGNAL WITHOUT DISTORTION OF GRANU...A SYSTEMATIC APPROACH TO AUTHENTICATE SONG SIGNAL WITHOUT DISTORTION OF GRANU...
A SYSTEMATIC APPROACH TO AUTHENTICATE SONG SIGNAL WITHOUT DISTORTION OF GRANU...
 
ANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKING
 
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
 
A SIMPLE IMAGE PROCESSING APPROACH TO ABNORMAL SLICES DETECTION FROM MRI TUMO...
A SIMPLE IMAGE PROCESSING APPROACH TO ABNORMAL SLICES DETECTION FROM MRI TUMO...A SIMPLE IMAGE PROCESSING APPROACH TO ABNORMAL SLICES DETECTION FROM MRI TUMO...
A SIMPLE IMAGE PROCESSING APPROACH TO ABNORMAL SLICES DETECTION FROM MRI TUMO...
 
Design and Development of an Image Based Plant Identification System Using Leaf
Design and Development of an Image Based Plant Identification System Using LeafDesign and Development of an Image Based Plant Identification System Using Leaf
Design and Development of an Image Based Plant Identification System Using Leaf
 
SPEEDY OBJECT DETECTION BASED ON SHAPE
SPEEDY OBJECT DETECTION BASED ON SHAPESPEEDY OBJECT DETECTION BASED ON SHAPE
SPEEDY OBJECT DETECTION BASED ON SHAPE
 
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONSEXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
 
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...
 
Development of a web based social networking system for self-management of di...
Development of a web based social networking system for self-management of di...Development of a web based social networking system for self-management of di...
Development of a web based social networking system for self-management of di...
 
Image deblurring based on spectral measures of whiteness
Image deblurring based on spectral measures of whitenessImage deblurring based on spectral measures of whiteness
Image deblurring based on spectral measures of whiteness
 
Probabilistic model based image segmentation
Probabilistic model based image segmentationProbabilistic model based image segmentation
Probabilistic model based image segmentation
 
The influence of eyes and brain
The influence of eyes and brainThe influence of eyes and brain
The influence of eyes and brain
 
Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...
 
Design of a virtual laboratory for analyzing nanoscale magnetic materials
Design of a virtual laboratory for analyzing nanoscale magnetic materialsDesign of a virtual laboratory for analyzing nanoscale magnetic materials
Design of a virtual laboratory for analyzing nanoscale magnetic materials
 
Review of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsReview of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithms
 
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETONIMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
IMPROVED PARALLEL THINNING ALGORITHM TO OBTAIN UNIT-WIDTH SKELETON
 
Mini curso marxismo e ecologia
Mini curso marxismo e ecologiaMini curso marxismo e ecologia
Mini curso marxismo e ecologia
 

Similar to BINOMIAL TRANSFORM BASED IMAGE AUTHENTICATION (BTIA)

Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
Audio Watermarking using Empirical Mode Decomposition
Audio Watermarking using Empirical Mode DecompositionAudio Watermarking using Empirical Mode Decomposition
Audio Watermarking using Empirical Mode DecompositionIRJET Journal
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption cscpconf
 
Sinan Sami.docx
Sinan Sami.docxSinan Sami.docx
Sinan Sami.docxraaed5
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofIAEME Publication
 
Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition IJECEIAES
 
Secure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCSecure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCijsrd.com
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...IJECEIAES
 
Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...TELKOMNIKA JOURNAL
 
A Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 VideoA Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 VideoCSCJournals
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor networkeSAT Publishing House
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor networkeSAT Journals
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
IRJET- Satellite Image Resolution Enhancement using Dual-tree Complex Wav...
IRJET-  	  Satellite Image Resolution Enhancement using Dual-tree Complex Wav...IRJET-  	  Satellite Image Resolution Enhancement using Dual-tree Complex Wav...
IRJET- Satellite Image Resolution Enhancement using Dual-tree Complex Wav...IRJET Journal
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...IRJET Journal
 
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...ijistjournal
 

Similar to BINOMIAL TRANSFORM BASED IMAGE AUTHENTICATION (BTIA) (20)

Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
Audio Watermarking using Empirical Mode Decomposition
Audio Watermarking using Empirical Mode DecompositionAudio Watermarking using Empirical Mode Decomposition
Audio Watermarking using Empirical Mode Decomposition
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Coding
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
K42016368
K42016368K42016368
K42016368
 
Sinan Sami.docx
Sinan Sami.docxSinan Sami.docx
Sinan Sami.docx
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
 
Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition
 
Secure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCSecure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTC
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...
 
Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...
 
A Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 VideoA Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 Video
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor network
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor network
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
IRJET- Satellite Image Resolution Enhancement using Dual-tree Complex Wav...
IRJET-  	  Satellite Image Resolution Enhancement using Dual-tree Complex Wav...IRJET-  	  Satellite Image Resolution Enhancement using Dual-tree Complex Wav...
IRJET- Satellite Image Resolution Enhancement using Dual-tree Complex Wav...
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
 
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

BINOMIAL TRANSFORM BASED IMAGE AUTHENTICATION (BTIA)

  • 1. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013 DOI : 10.5121/ijma.2013.5405 67 BINOMIAL TRANSFORM BASED IMAGE AUTHENTICATION (BTIA) S. K.Ghosal1 and J. K. Mandal2 1 Department of Computer Science and Engineering, Greater Kolkata College of Engineering & Management, Baruipur, West Bengal, India sudipta.ghosal@gmail.com 2 Department of Computer Science and Engineering, Kalyani University, Kalyani, West Bengal, India jkm.cse@gmail.com ABSTRACT In this paper, a fragile watermarking technique based on Binomial transform (BT) has been proposed for color image authentication (BTIA). An initial adjustment is applied to adjust the pixel values. The Binomial transform (BT) is applied to convert each pair of pixel components into transform domain in row major order. Two bits of the authenticating watermarks, starting from the least significant bit position are embedded into each component of transformed pair. A post-embedding adjustment has also been incorporated to keep the embedded component values closest to the original without hampering the embedded watermark bits. The inverse Binomial transform (IBT) is applied on each adjusted pair to re- generate the pixel components which successively produce the watermarked image. At the receiving end, the whole watermark can be extracted by the reverse procedure which can be verified for authentication by obtaining a message digest. Experimental results conform that the proposed technique offers a higher payload and PSNR over existing techniques [7, 9]. KEYWORDS BTIA, BT, IBT, Payload, PSNR and Watermarked image. 1. INTRODUCTION Security of digital information in the form of text, audio, video etc. is become an important issue for today’s world. Digital media can be protected through different schemes like cryptography, steganography, watermarking etc. Digital watermarking is an idea of fabricating secret information into the carrier/cover media such as image, audio and video etc. for ownership evidence, fingerprinting, authentication and integrity verification. The objective of this paper is to authenticate a carrier image through a fragile watermarking technique where Binomial transform has been introduced for embedding purpose. Various transformations are applied on the carrier image to convert it from spatial domain into transform domain for authentication. Some popular transform domain technique includes Quaternion Fourier Transformation (QFT) [1], discrete cosine transformation (DCT) [2], discrete wavelet transformation (DWT) [3], or discrete Fourier transform (DFT) [4] based watermarking where the transformed components are used to fabricate the secret data. Transformed components are modified slightly to embed the secret data while the watermarked image can be obtained by applying the respective inverse transformation on the modified components.
  • 2. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013 68 The effectiveness of various watermarking techniques can be measured in terms of payload, peak signal to noise ratio and image fidelity etc. In this regard, the Binomial transform [5-6] is an excellent choice for embedding watermark information. In [7], a Binomial transform based fragile watermarking technique is applied on each 2 x 2 image block where a 128 bit message digest is used for authentication purpose. The existing method [7] can be improvised by applying the Binomial transform on a pair of pixel components instead over a 2 x 2 pixel block. As a result, the payload can be enhanced significantly and the quality degradation becomes minimal. On embedding authenticating watermark (message/image) bits, inverse Binomial transformation is applied to re-generate the watermarked image in spatial domain. The binomial transform (BT) is applied on pixel components {an} to generate transformed components {sn} using equation (1). (1) Similarly, the inverse Binomial transform (IBT) is used to convert back the transformed components into pixel domain using equation (2). (2) The main objective of proposed technique emphasizes on color image authentication by protecting secret watermark. The message digest MD (which is generated from watermark data) is used for authentication by verifying the integrity of the carrier image. Section 2 and 3 of the paper discussed the formulation of the Binomial transform for a pair of pixel components and the proposed technique. Results, comparison and analysis are given in section 4. Conclusions are drawn in section 5. References are given at end. 2.TRANSFORMATION TECHNIQUES The formulation can be derived by transforming each pair of pixel components (ai, ai+1) into a pair of transformed components (si, si+1) using the Binomial transform (BT) given in equation (3). si = ai si+1 = ai - ai+1 (3) where si and si+1 represents the pair of transformed components corresponding to the pixel components ai and ai+1. Similarly, by applying the inverse Binomial transform (IBT), each pair of transformed components (si, si+1) are converted back into the spatial domain which consists of pixel components ai and ai+1 as per equation (4). ai = si ai+1 = si - si+1 (4)
  • 3. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013 69 3. PROPOSED TECHNIQUE In this paper, a novel watermarking technique has been proposed based on the Binomial transform (BT) for color images. A message digests (MD), content of the watermark and the watermark size are embedded using the proposed technique. Each pair of pixel components of the carrier image is pre-processed for an initial adjustment, if necessary. The initial adjustment sets a new upper limit (i.e., 248) and a lower limit (i.e., 8) for a pixel component. This pre-embedding pixel adjustment strategy ensures that the pixel values on embedding the watermark must lie within the valid range (0 ≤ p ≤ 255). The Binomial transform (BT) is used to convert each pair of pixel components into transformed components in row major order. Each component of a transformed pair is capable of hiding two bits of the authenticating watermark starting from the least significant bit position (LSB-0). A post-embedding adjustment has been incorporated to keep the embedded transformed components closest to the original without hampering the fabricated watermark bits. The inverse Binomial transform (IBT) is applied on each adjusted components to produce the watermarked image in spatial domain. This process is continued till the last pixel pair of the carrier/cover image in a row major order. The authorized recipient extracts the watermark from the watermarked image through reverse process and new message digest (MD') are obtained from the extracted watermark bits. The same is compared with extracted message digests (MD) at the destination end for authentication. Consider three pairs of pixel components corresponding to red, green and blue channels from a given cover/carrier image. Binomial transform (BT) is applied on each pair of pixel components to convert it into transformed components. Let, the three pair of pixel components are R1, G1 and B1. The steps are as follows: R1={164,63}, G1={253,57}, B1={71,5} On initial adjustment, the pairs of pixel components become: R1={164,63}, G1={248,57}, B1={71,8} Applying Binomial transforms (BT) on each pair of pixel components, the obtained pairs of transformed components are as here under: TR1={164,101}, TG1={248,191}, TB1={71,63} Now, if we embed the binary stream of 010001110100 using the proposed technique, the embedded components pairs becomes: ETR1={165,100}, ETG1={249,191}, ETB1={69,60} The transformed adjustment method ensures that the bits which are not taking part in embedding can form a set of patterns of 0’s and 1’s followed by the fabricated bits. Consequently, the value closest to the original transformed component is chosen from all the possible combinations. So, after adjusted components are as here under: AETR1={165,100}, AETG1={249,191}, AETB1={69,64} Again, by applying inverse Binomial transform (IBT) on each pair of transformed components, the obtained pairs of pixel components are as shown below: F-1 AETR1={165,65}, F-1 AETG1={249,58}, F-1 AETB1={69,5}
  • 4. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013 70 The process of embedding is repeated for each pair of pixel components and continued till the end of authenticating watermark bits. This section has been categorized into two parts namely the algorithm for insertion and the algorithm for extraction. 3.1. Insertion Initially, each pixel component pair are pre-adjusted, if necessary and then converted into the pair of transformed components corresponding to red, green and blue channels based on Binomial transforms (BT). Each transformed component (R/G/B) can fabricate two bits at the least two significant bit positions (LSB-0 and LSB-1). A post-embedded processing has been incorporated to adjust the transformed components without hampering the embedded bits. Inverse Binomial transform (IBT) converts each pair of embedded as well as adjusted components into the pair of pixel components which in succession produces the final watermarked image. Algorithm: Input: The 128 bits message digest MD derived from the authenticating watermark, the carrier/cover image (I) and an authenticating watermark (message/image). Output: The watermarked image (I′). Methods: The Binomial transform (BT) is used to fabricate the watermark (along with a message digest) into the carrier images by converting the image from spatial domain into transform domain. Embedding bits in transform domain offers high robustness and improved security. The detailed steps of embedding are as follows: Steps: 1) A 128 bits message digest (MD) is obtained from the watermark to authenticate a color image. 2) The size of the authenticating watermark (L) can be expressed by equation (5). Wsize=[2 × {3 × (m × n)} – (MD + L)] (5) where, the number of bits embedded per byte is 2, MD and L are the message digest and dimension of the authenticating watermark for the m x n color image. The dimension L consists of 32 bits of which 16 bits for width and remaining 16 bits for height. 3) Read authenticating watermark message/image and perform the operations given below: • The carrier/host image (I) is partitioned into pair of pixel components namely pj, pi+1 in row major order. • For each channel (Red/Green/Blue), reset the upper and lower limit of pixel component (pc) to retain the value positive and less than, or equal to 255 before embedding watermark bits. That means, pc = {248: pc ≥ 248 = |8: pc ≤ 8 (6) • Apply Binomial transform (BT) on each pair of pixel components to generate transformed components pair consisting of components fi and fi+1.
  • 5. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013 71 • Two bits of the authenticating watermark size, content and the message digests are embedded in each transformed component of every transformed pair starting from the least significant bit position (i.e., LSB-0). [Embed authenticating watermark bits as per the above rules.] • An adjustment has been incorporated to get transformed components closest to the original without hampering the embedded bits. The adjustment has been done by altering left most (T-3) bits followed by choosing the embedded component value closest to the original one where T is the total number of bits used to represent an embedded component. • Apply inverse Binomial transform (IBT) on each pair of adjusted components to re-generate the pixel components pair in spatial domain. 4) Repeat step 3 until and unless the whole authenticating watermark size, content and the message digest MD is embedded. Successive pair of fabricated pixel pair produces the watermarked image (I′). 5) Stop. 3.2. Extraction The authenticated watermarked image is received in spatial domain. The Binomial transform (BT) converts each pair of pixel components into transformed components. The watermark size, contents and the embedded message digests (MD) are extracted from each transformed component. A new message digest (MD') has been obtained from the extracted watermark which in turn compared with the extracted message digests (MD) for authentication. Algorithm: Input: The watermarked image (I′) in spatial domain. Output: The authenticating watermark image (W) and the message digest. Methods: The Binomial transform (BT) is used to extract the watermark (along with a message digest) from the watermarked image by converting the image from spatial domain to transform domain. Successive extracted bits forms the watermark data and generate a message digest which in turn used for authentication. The detailed steps of extraction are as follows: Steps: 1) The watermarked image (I') is partitioned into pair of pixel components namely pj, pi+1 in row major order. 2) Read each pair of transformed components and do the following operations: • Apply Binomial transform (BT) on a pair of pixel components corresponding of Red/Green/Blue channel, to generate transformed components pair consisting of transformed components fi and fi+1. • Two bits of the authenticating watermark size, content and the message digests are extracted from each transformed component of every transformed pair starting from the LSB-0. [Extract authenticating message/image bit as per the above rules.] • For each 8 (eight) bits extraction, it constructs one alphabet/one primary (R/G/B) color component. • Apply inverse Binomial transform (IBT) on each pair of transformed components to convert back it into the spatial domain. 3) Repeat step 1 and 2 to complete decoding as per the size of the authenticating watermark.
  • 6. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013 72 4) Obtain 128 bits message digest MD′ from the extracted watermark. Compare MD′ with extracted MD. If both are same then the image is authorized, else unauthorized. 5) Stop. 4. RESULTS, COMPARISON AND ANALYSIS Five different carrier/cover images [8] of dimension 512 × 512 are taken to incorporate the gold coin (i.e. the authenticating watermark image). Images are labelled as: (i) Lena, (ii) Baboon, (iii) Pepper, (iv) Earth and (v) Sailboat. On embedding the Gold-Coin image of (vi), the newly generated watermarked image produces a good visual clarity and huge payload. (i) Lena (ii) Baboon (iii) Pepper (iv) Earth (v) Sailboat (vi) Gold Coin Figure 1. Different cover/carrier images of dimension 512 × 512 along with the watermark It is seen from table 1 that the watermarked image has a peak to signal noise ratio (PSNR) of around 42 dB in average case whereas the bits per byte (bpB) for a given carrier image is 2. Table 1. Results of embedding of 195638 bytes of information into each carrier image of dimension 512 x 512 Carrier Image Max. Payload (byte) PSNR IF bpB Lena 196608 42.46 0.9998 2 Baboon 196608 42.46 0.9998 2 Pepper 196608 40.18 0.9995 2 Earth 196608 42.49 0.9998 2 Sailboat 196608 42.14 0.9998 2 AVG 196608 41.94 0.9997 2 Again, it is seen from table 2 that the PSNR and payload has been significantly improved in our proposed technique over the Mandal and Ghosal’s existing technique [7] and Varsaki et al.’s [9] method. Table 2. Comparison of bpB and PSNR for proposed technique over Mandal and Ghosal’s [7] method and Varsaki et. Al’s [9] method Carrier Images Varsaki et al.’s Method [9] Mandal and Ghosal’s technique [7] Proposed Technique bpB (bits per byte) PSNR (dB) bpB (bits per byte) PSNR (dB) bpB (bits per byte) PSNR (dB) Lena 0.25 39.70 1.5 41.40 2 42.46 Baboon 0.25 30.69 1.5 42.05 2 42.46 Sailboat 0.25 35.28 1.5 41.67 2 42.14 AVG 0.25 35.22 1.5 41.70 2 42.35
  • 7. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013 73 The standard deviation analysis for varying sizes over the ’Lena’ image is shown in figure 2. It ensures that the change made into the watermarked image using our proposed technique is really very minimal and almost identical to the original image. Standard deviation analysis for'Lena' image using Mandal and Ghosal's method [7] and the proposed method 45 45.5 46 46.5 47 47.5 48 64 x 64 128 x 128 256 x 256 512 x 512 Size of Image/Pixel StandardDeviation Original Image Mandal and Ghosal's technique[7] Proposed Technique Figure 2: Comparison of standard deviation between source and watermarked ‘Lena’ image using Mandal and Ghosal’s method [7] and the proposed technique In this authentication system, the recipient operate the authentication process by matching the extracted message digest MD with the newly generated message digest MD', where MD' can be obtained from the extracted watermark image. If the extracted message digest MD matches with the newly generated message digest MD', then the authentication process is said to be successful, otherwise, it is unauthorized. The PSNR (Peak Signal to Noise Ratio) and NCC (Normalized Cross-correlation) values are obtained from the watermarked images which is seen from table 3 by introducing attacks namely ‘Median Filtering’, ‘Speckle Noise’ and ‘Salt & Pepper Noise’. It also ensures that the qualities of attacked watermarked images are still well perceptible but the message digest ensures that it is tampered. Table 3. Comparison of PSNR and NCC values of the watermarked images under different kind of attacks Water- marked Images PSNR NCC PSNR NCC PSNR NCC PSNR NCC Before attack After Median Filtering attack ( 3 x 3 neighbourhood) After Speckle Noise attack (Variance = 0.001) After Salt & Pepper Noise attack (Noise Density=0.001) Lena 42.46 0.9998 33.56 0.9968 34.38 0.9988 34.75 0.9987 Pepper 40.18 0.9995 31.56 0.9941 34.50 0.9985 33.82 0.9978 Sailboat 42.14 0.9998 28.49 0.9948 34.33 0.9988 34.49 0.9988 5. CONCLUSION The proposed technique is an image authentication process in transform domain to enhance the security compared to the existing algorithm. Authentication is done by embedding watermark data in a carrier image. Using the technique two bits can be embedded in transformed components. Experimental results conform that the proposed algorithm performs better than existing techniques [7, 9].
  • 8. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013 74 ACKNOWLEDGEMENT The author expressed deep sense of gratitude to the PVRSE scheme of DST, Govt. of India through which the experimental setup has been used for the research at the department of computer science and engineering, University of Kalyani. REFERENCES [1] Pei S.C., Ding J.J., Chang J.H., “Efficient Implementation of Quaternion Fourier Transform, Convolution, and Correlation by 2-D Complex FFT”, IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 49, NO. 11, pp 27-83, 2001. [2] N. Ahmed, T. Natarajan and K. R. Rao, “Discrete cosine transform,” IEEE Transactions on Computers, Vol.C-23, pp.90-93, 1974. [3] Rioul and P. Duhamel, “Fast algorithms for wavelet transforms,” IEEE Transaction on Information Theory, Vol.38, No.2, pp.569-586, 1992. [4] E. O. Brigham, “The fast Fourier transform,” Englewood Cliffs, NJ: Prentice-Hall, 1974. [5] Borisov B. and Shkodrov V., Divergent Series in the Generalized Binomial Transform, Adv. Stud. Cont. Math., 14 (1): 77-82, 2007. [6] S. Falcon and A. Plaza, "Binomial transforms of the k-Fibonacci sequence", International Journal of Nonlinear Sciences and Numerical Simulation 10(11-12): 1527-1538, 2009. [7] Mandal, J. K., Ghosal S. K., “A Fragile Watermarking based on Binomial Transform in Color Images”, Proceedings of Third International Conference on Computer Science & Information Technology (CCSIT 2013), ISBN : 978-1-921987-00-7, Feb.18-20, 2013, Bangalore, India., DOI : 10.5121/csit.2013.3632, Volume 3, Number 6, 2013, pp. 281–288, 2013. [8] Allan G. Weber, The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering. http://sipi.usc.edu/database/ (accessed on 25th January, 2010). [9] Varsaki et al, “On the use of the discrete Pascal transform in hiding data in images”, “Optics, Photonics, and Digital Technologies for Multimedia Applications”, Proc. of SPIE Vol. 7723, 77230L • © 2010 SPIE • CCC code: 0277-786X/10/$18 • doi: 10.1117/12.854220, 2010. Authors Sudipta Kr Ghosal, Assistant Professor and Teacher in-charge of Computer Science & Engineering department at Greater Kolkata College of Engineering & Management, Kolkata. He received his bachelor of technology in Computer science and Engineering in 2007. He received his master of technology in IT (Courseware Engineering) from Jadavpur University, Kolkata, India in 2010. He is pursuing PhD in Color Image Authentication from University of Kalyani, India under the supervision of Prof. J. K. Mandal. Mr. Ghosal has around four years of experience in teaching and industry. He has fifteen publications in the national and international conferences/journals. Jyotsna Kumar Mandal, M. Tech.(Computer Science, University of Calcutta), Ph.D.(Engg., Jadavpur University) in the field of Data Compression and Error Correction Techniques, Professor in Computer Science and Engineering, University of Kalyani, India. Life Member of Computer Society of India since 1992 and life member of cryptology Research Society of India. Ex-Dean Faculty of Engineering, Teachnology & Management, working in the field of Network Security, Steganography, Remote Sensing & GIS Application, Image Processing. 26 years of teaching and research experiences. Nine Scholars awarded Ph.D. one submitted and eight are pursuing. Total number of publications is more than two hundred seventy seven in addition of publication of five books from LAP Lambert, Germany.