Skip to main content

A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images

  • Conference paper
  • First Online:
Book cover Security in Computing and Communications (SSCC 2015)

Abstract

In a cyberspace where disparate applications are engaged in multimedia transmission, data compression is a key for maintaining bandwidth usage efficiency as well meeting the data requirements of the disparate applications. Security of data in such environment needed to be guaranteed. Cryptographic approaches engaged in the process have to be efficient enough to stand against attacks and also to maintain important visual continents after compression. In our work, we proposed a fast discrete cosine transform and a cryptographic technique for authentication and security of digital images. The cryptographic approach was applied to the image after compression, and before decompression, the image was successfully decrypted without significant loss of visual data. There was a loss in pixel values due to the compression process. The implementation of the proposed approach was done successfully and analysis of the output results was done using MATLAB.

This work was supported by Lab-STICC (UMR CNRS 6285) Research Laboratory, UBO France, AWBC Canada, Ambassade de France-Institut Français-Ghana and the DCSIT-UCC

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kang, H., Iwamura, K.: Information hiding method using best DCT and wavelet coefficients and itswatermark competition. Entropy 17(3), 1218–1235 (2015)

    Article  Google Scholar 

  2. Tomar, R., Patni, J.C., Dumka, A., Anand, A.: Blind watermarking technique for grey scale image using block level discrete cosine transform (DCT). In: Satapathy, S.C., Govardhan, A., Srujan Raju, K., Mandal, J.K. (eds.) Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2, vol. 338, pp. 81–89. Springer, Heidelberg (2015)

    Google Scholar 

  3. Dumas, J.G., Roch, J.L., Tannier, E., Varrette, S.: Foundations of Coding: Compression, Encryption, Error Correction. Wiley, New Jersey (2015)

    Book  Google Scholar 

  4. Ji, X.Y., Bai, S., Guo, Y., Guo, H.: A new security solution to JPEG using hyper-chaotic system and modified zigzag scan coding. Commun. Nonlinear Sci. Numer. Simul. 22(1), 321–333 (2015)

    Article  Google Scholar 

  5. Furqan, A., Kumar, M.: Study and analysis of robust DWT-SVD domain based digital image watermarking technique using MATLAB. In: 2015 IEEE International Conference on Computational Intelligence and Communication Technology (CICT), pp. 638–644. IEEE, February 2015

    Google Scholar 

  6. Lin, S.D., Chen, C.-F.: A robust DCT-based watermarking for copyright protection. IEEE Trans. Consum. Electron. 46(3), 415–421 (2000). doi:10.1109/30.883387

    Article  Google Scholar 

  7. Al-Haj, A.: Combined DWT-DCT digital image watermarking. J. Comput. Sci. 3(9), 740 (2007)

    Article  Google Scholar 

  8. Douak, F., Benzid, R., Benoudjit, N.: Color image compression algorithm based on the DCT transform combined to an adaptive block scanning. AEU-Int. J. Electron. Commun. 65(1), 16–26 (2011)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by Lab-STICC (UMR CNRS 6285) at UBO France, AWBC Canada, Ambassade de France-Institut Français-Ghana and the DCSIT-UCC, and also Dominique Sotteau (formerly directeur de recherche, Centre national de la recherche scientifique (CNRS) in France and head of international relations, Institut national de recherche en informatique et automatique, INRIA) and currently the Scientific counselor of AWBC.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quist-Aphetsi Kester .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kester, QA., Nana, L., Pascu, A.C., Gire, S., Eghan, J.M., Quaynor, N.N. (2015). A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics