Open Access   Article Go Back

Authentication through Hough Signature on G-Let D4 Domain (AHSG – D4)

Madhumita Mallick1 , Madhumita Sengupta2 , J. K. Mandal3

Section:Research Paper, Product Type: Conference Paper
Volume-03 , Issue-01 , Page no. 59-67, Feb-2015

Online published on Feb 18, 2015

Copyright © Madhumita Mallick, Madhumita Sengupta , J. K. Mandal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Madhumita Mallick, Madhumita Sengupta , J. K. Mandal, “Authentication through Hough Signature on G-Let D4 Domain (AHSG – D4),” International Journal of Computer Sciences and Engineering, Vol.03, Issue.01, pp.59-67, 2015.

MLA Style Citation: Madhumita Mallick, Madhumita Sengupta , J. K. Mandal "Authentication through Hough Signature on G-Let D4 Domain (AHSG – D4)." International Journal of Computer Sciences and Engineering 03.01 (2015): 59-67.

APA Style Citation: Madhumita Mallick, Madhumita Sengupta , J. K. Mandal, (2015). Authentication through Hough Signature on G-Let D4 Domain (AHSG – D4). International Journal of Computer Sciences and Engineering, 03(01), 59-67.

BibTex Style Citation:
@article{Mallick_2015,
author = {Madhumita Mallick, Madhumita Sengupta , J. K. Mandal},
title = {Authentication through Hough Signature on G-Let D4 Domain (AHSG – D4)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2015},
volume = {03},
Issue = {01},
month = {2},
year = {2015},
issn = {2347-2693},
pages = {59-67},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=9},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=9
TI - Authentication through Hough Signature on G-Let D4 Domain (AHSG – D4)
T2 - International Journal of Computer Sciences and Engineering
AU - Madhumita Mallick, Madhumita Sengupta , J. K. Mandal
PY - 2015
DA - 2015/02/18
PB - IJCSE, Indore, INDIA
SP - 59-67
IS - 01
VL - 03
SN - 2347-2693
ER -

           

Abstract

In this paper an authentication technique has been proposed based on G-Let transformation technique. Digital documents are authenticated by embedding Hough transform generated signature, which generated from the original autograph image. Cover image passes through G-Let transformation technique to generate n number of G-Lets. Out of which few selected G-lets are embedded with secret signature, generated by Hough transform technique. Rests of the G-Lets are used for adjustment to minimize the error factor. Experimental results are computed and compared with the existing authentication techniques Li’s method, Region-Based method based on SCDFT, which indicates better performance in AHSG-D4, in terms of better by means of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF).

Key-Words / Index Term

Steganography; Peak Signal to Noise Ratio (PSNR). G-Lets; Authentication; Hough transform; Mean Square Error (MSE); Image Fidelity (IF)

References

[1] Sengupta, M., & Mandal, J. K. (2013, September 27–28). Authentication through Hough transformation generated Signature on G-Let D3 Domain (AHSG). Presented in first international conference on Computational Intelligence: Modeling, Techniques and Applications (CIMTA- 2013), Proceedings published with Procedia Technology, Elsevier, 10,121-130. ISSN 2212-0173, website: www.sciencedirect.com.
[2] Rajathilagam, B., Rangarajan, M., Soman, K.P., “G-Lets: A New Signal Processing Algorithm”, International Journal of Computer Applications (0975 – 8887) Volume 37– No.6, Published by Foundation of Computer Science, New York, USA, doi : 10.5120/4609-6591, January 2012.
[3] Li Yuancheng, Xiaolei Wang, “A watermarking method combined with Radon transform and 2D-wavelet transform”, IEEE, Proceedings of the 7th World Congress on Intelligent Control and Automation, June 25 - 27, Chongqing, China, 2008.
[4] T. T. Tsui, X. –P. Zhang, and D. Androutsos, Color Image Watermarking Usimg Multidimensional Fourier Transformation, IEEE Trans. on Info. Forensics and Security, vol. 3, no. 1, pp. 16-28, 2008.
[5] J. K. Mandal, Madhumita Sengupta, “Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF)”, IEEE, Second International Conference on Emerging Applications of Information Technology (EAIT 2011), print ISBN: 978-1-4244-9683-9, doi: 10.1109/EAIT.2011.24, pp- 298 – 301, 2011.
[6] A. Nikolaidis, I. Pitas, “Region-Based Image Watermarking”, IEEE Transactions on Image Processing, Vol. 10, NO. 11, pp. 1721-1740, November 2001.
[7] J. K. Mandal, Madhumita Sengupta, “Authentication /Secret Message Transformation Through Wavelet Transform based Subband Image Coding (WTSIC)”, IEEE, International Symposium on Electronic System Design, pp 225-229, ISBN 978-0-7695-4294-2, Bhubaneswar, India, Print ISBN: 978-1-4244-8979-4, doi 10.1109/ISED.2010.50, 2010.
[8] M. Kutter , F. A. P. Petitcolas, A fair benchmark for image watermarking systems, Electronic Imaging '99. Security and Watermarking of Multimedia Contents, vol. 3657, Sans Jose, CA, USA, January 1999. The International Society for Optical Engineering.
[9] V.F. Leavers, “Shape detection in computer vision using the hough transformation”, Springer-Verlag, Berlin, 1992, 201 pages, ISBN- 3-540-19723-0, Published online by Cambridge University Press 09 Mar 2009, doi: 10.1017/S0263574700016210.
[10] P.V. C. Hough. A Method and Means for Recognizing Complex Patterns. US Patent: 3,069,654, Dec. 1962.
[11] Rajathilagam, B., Rangarajan, M., and Soman, K.P., G-lets: Signal Processing Algorithm Using Transformation Groups, IEEE Trans. Imag. Proc., 2011.
[12] Madhumita Sengupta, J. K. Mandal, “Authentication in Wavelet Transform Domain through Hough Domain Signature (AWTDHDS)” UGC-Sponsored National Symposium on Emerging Trends in Computer Science (ETCS 2012), ISBN number 978-81-921808-2-3, pp 61-65, (2012).
[13] Madhumita Sengupta, J. K. Mandal “Image Authentication using Hough Transform generated Self Signature in DCT based Frequency Domain (IAHTSSDCT)”, IEEE, ISED- 2011, Kochi, Kerala, pp- 324-328, DOI 10.1109/ISED.2011.43,(2011).
[14] Allan G. Weber, The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering. http://sipi.usc.edu/database/(accessed on 25thJan, 2013).
[15] Madhumita Sengupta, & J. K. Mandal, "Authentication of Images through Non Convoluted DCT (AINCDCT)".Published in first IEEE International Conference on Communication and Industrial Application (ICCIA 2011).1 - 4. doi: 10.1109/ICCIndA.2011.6146672, December, 2011.
[16] Madhumita Sengupta, & J. K. Mandal, Image Authentication through Z-Transform with Low Energy and Bandwidth (IAZT). International Journal of Network Security & Its Applications (IJNSA) of AIRCC, 5(5), 43–62. doi:10.5121/ijnsa.2013.5504. 2013, September.
[17] Madhumita Sengupta, & J. K. Mandal, "Transformed IRIS Signature fabricated Authentication in Wavelet based Frequency Domain (TISAWFD)". International Journal of Advanced Research in Computer Science (IJARCS), 2(5), 486- 490. ISSN No: 0976-5697, Sep-Oct 2011.