Abstract
In a cyberspace where disparate applications are engaged in multimedia transmission, data compression is a key for maintaining bandwidth usage efficiency as well meeting the data requirements of the disparate applications. Security of data in such environment needed to be guaranteed. Cryptographic approaches engaged in the process have to be efficient enough to stand against attacks and also to maintain important visual continents after compression. In our work, we proposed a fast discrete cosine transform and a cryptographic technique for authentication and security of digital images. The cryptographic approach was applied to the image after compression, and before decompression, the image was successfully decrypted without significant loss of visual data. There was a loss in pixel values due to the compression process. The implementation of the proposed approach was done successfully and analysis of the output results was done using MATLAB.
This work was supported by Lab-STICC (UMR CNRS 6285) Research Laboratory, UBO France, AWBC Canada, Ambassade de France-Institut Français-Ghana and the DCSIT-UCC
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kang, H., Iwamura, K.: Information hiding method using best DCT and wavelet coefficients and itswatermark competition. Entropy 17(3), 1218–1235 (2015)
Tomar, R., Patni, J.C., Dumka, A., Anand, A.: Blind watermarking technique for grey scale image using block level discrete cosine transform (DCT). In: Satapathy, S.C., Govardhan, A., Srujan Raju, K., Mandal, J.K. (eds.) Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2, vol. 338, pp. 81–89. Springer, Heidelberg (2015)
Dumas, J.G., Roch, J.L., Tannier, E., Varrette, S.: Foundations of Coding: Compression, Encryption, Error Correction. Wiley, New Jersey (2015)
Ji, X.Y., Bai, S., Guo, Y., Guo, H.: A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding. Commun. Nonlinear Sci. Numer. Simul. 22(1), 321–333 (2015)
Furqan, A., Kumar, M.: Study and analysis of robust DWT-SVD domain based digital image watermarking technique using MATLAB. In: 2015 IEEE International Conference on Computational Intelligence and Communication Technology (CICT), pp. 638–644. IEEE, February 2015
Lin, S.D., Chen, C.-F.: A robust DCT-based watermarking for copyright protection. IEEE Trans. Consum. Electron. 46(3), 415–421 (2000). doi:10.1109/30.883387
Al-Haj, A.: Combined DWT-DCT digital image watermarking. J. Comput. Sci. 3(9), 740 (2007)
Douak, F., Benzid, R., Benoudjit, N.: Color image compression algorithm based on the DCT transform combined to an adaptive block scanning. AEU-Int. J. Electron. Commun. 65(1), 16–26 (2011)
Acknowledgments
This work was supported by Lab-STICC (UMR CNRS 6285) at UBO France, AWBC Canada, Ambassade de France-Institut Français-Ghana and the DCSIT-UCC, and also Dominique Sotteau (formerly directeur de recherche, Centre national de la recherche scientifique (CNRS) in France and head of international relations, Institut national de recherche en informatique et automatique, INRIA) and currently the Scientific counselor of AWBC.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kester, QA., Nana, L., Pascu, A.C., Gire, S., Eghan, J.M., Quaynor, N.N. (2015). A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-MartÃnez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-22915-7_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22914-0
Online ISBN: 978-3-319-22915-7
eBook Packages: Computer ScienceComputer Science (R0)