Authentication through Hough Signature on G-Let D4 Domain (AHSG – D4)

Authors

  • Mallick M Dept. of Computer Science & Engineering University of Kalyani West Bengal, India
  • Sengupta M Dept. of Computer Science & Engineering University of Kalyani West Bengal, India
  • JK Mandal Dept. of Computer Science & Engineering University of Kalyani West Bengal, India

Keywords:

Steganography, Peak Signal to Noise Ratio (PSNR), G-Lets, Authentication, Hough transform, Mean Square Error (MSE), Image Fidelity (IF)

Abstract

In this paper an authentication technique has been proposed based on G-Let transformation technique. Digital documents are authenticated by embedding Hough transform generated signature, which generated from the original autograph image. Cover image passes through G-Let transformation technique to generate n number of G-Lets. Out of which few selected G-lets are embedded with secret signature, generated by Hough transform technique. Rests of the G-Lets are used for adjustment to minimize the error factor. Experimental results are computed and compared with the existing authentication techniques Li’s method, Region-Based method based on SCDFT, which indicates better performance in AHSG-D4, in terms of better by means of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF).

References

Sengupta, M., & Mandal, J. K. (2013, September 27–28). Authentication through Hough transformation generated Signature on G-Let D3 Domain (AHSG). Presented in first international conference on Computational Intelligence: Modeling, Techniques and Applications (CIMTA- 2013), Proceedings published with Procedia Technology, Elsevier, 10,121-130. ISSN 2212-0173, website: www.sciencedirect.com.

Rajathilagam, B., Rangarajan, M., Soman, K.P., “G-Lets: A New Signal Processing Algorithm”, International Journal of Computer Applications (0975 – 8887) Volume 37– No.6, Published by Foundation of Computer Science, New York, USA, doi : 10.5120/4609-6591, January 2012.

Li Yuancheng, Xiaolei Wang, “A watermarking method combined with Radon transform and 2D-wavelet transform”, IEEE, Proceedings of the 7th World Congress on Intelligent Control and Automation, June 25 - 27, Chongqing, China, 2008.

T. T. Tsui, X. –P. Zhang, and D. Androutsos, Color Image Watermarking Usimg Multidimensional Fourier Transformation, IEEE Trans. on Info. Forensics and Security, vol. 3, no. 1, pp. 16-28, 2008.

J. K. Mandal, Madhumita Sengupta, “Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF)”, IEEE, Second International Conference on Emerging Applications of Information Technology (EAIT 2011), print ISBN: 978-1-4244-9683-9, doi: 10.1109/EAIT.2011.24, pp- 298 – 301, 2011.

A. Nikolaidis, I. Pitas, “Region-Based Image Watermarking”, IEEE Transactions on Image Processing, Vol. 10, NO. 11, pp. 1721-1740, November 2001.

J. K. Mandal, Madhumita Sengupta, “Authentication /Secret Message Transformation Through Wavelet Transform based Subband Image Coding (WTSIC)”, IEEE, International Symposium on Electronic System Design, pp 225-229, ISBN 978-0-7695-4294-2, Bhubaneswar, India, Print ISBN: 978-1-4244-8979-4, doi 10.1109/ISED.2010.50, 2010.

M. Kutter , F. A. P. Petitcolas, A fair benchmark for image watermarking systems, Electronic Imaging '99. Security and Watermarking of Multimedia Contents, vol. 3657, Sans Jose, CA, USA, January 1999. The International Society for Optical Engineering.

V.F. Leavers, “Shape detection in computer vision using the hough transformation”, Springer-Verlag, Berlin, 1992, 201 pages, ISBN- 3-540-19723-0, Published online by Cambridge University Press 09 Mar 2009, doi: 10.1017/S0263574700016210.

P.V. C. Hough. A Method and Means for Recognizing Complex Patterns. US Patent: 3,069,654, Dec. 1962.

Rajathilagam, B., Rangarajan, M., and Soman, K.P., G-lets: Signal Processing Algorithm Using Transformation Groups, IEEE Trans. Imag. Proc., 2011.

Madhumita Sengupta, J. K. Mandal, “Authentication in Wavelet Transform Domain through Hough Domain Signature (AWTDHDS)” UGC-Sponsored National Symposium on Emerging Trends in Computer Science (ETCS 2012), ISBN number 978-81-921808-2-3, pp 61-65, (2012).

Madhumita Sengupta, J. K. Mandal “Image Authentication using Hough Transform generated Self Signature in DCT based Frequency Domain (IAHTSSDCT)”, IEEE, ISED- 2011, Kochi, Kerala, pp- 324-328, DOI 10.1109/ISED.2011.43,(2011).

Allan G. Weber, The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering. http://sipi.usc.edu/database/(accessed on 25thJan, 2013).

Madhumita Sengupta, & J. K. Mandal, "Authentication of Images through Non Convoluted DCT (AINCDCT)".Published in first IEEE International Conference on Communication and Industrial Application (ICCIA 2011).1 - 4. doi: 10.1109/ICCIndA.2011.6146672, December, 2011.

Madhumita Sengupta, & J. K. Mandal, Image Authentication through Z-Transform with Low Energy and Bandwidth (IAZT). International Journal of Network Security & Its Applications (IJNSA) of AIRCC, 5(5), 43–62. doi:10.5121/ijnsa.2013.5504. 2013, September.

Madhumita Sengupta, & J. K. Mandal, "Transformed IRIS Signature fabricated Authentication in Wavelet based Frequency Domain (TISAWFD)". International Journal of Advanced Research in Computer Science (IJARCS), 2(5), 486- 490. ISSN No: 0976-5697, Sep-Oct 2011.

Downloads

Published

2015-02-28

How to Cite

[1]
M. Mallick, M. Sengupta, and J. Mandal, “Authentication through Hough Signature on G-Let D4 Domain (AHSG – D4)”, Int. J. Comp. Sci. Eng., vol. 3, no. 1, pp. 59–67, Feb. 2015.