A. Khamrui

Learn More
In this paper Genetic Algorithm based image authentication technique in frequency domain using Z transformation (IAFDGA) has been proposed. A 2×2 mask is taken from the source image in row major order. Z transformation is applied to transform it into frequency domain. Six bits are embedded in each sub mask into the second and third transformed coefficients.(More)
²In this paper an authentication/data hiding technique through steganographic approach termed as DEGGA has been proposed using Genetic Algorithm. Large volume of message/ image is embedded in spatial domain using 3 x 3 masks from the source image in row major order. Four bits of the authenticating image is embedded per byte of the source image onto the(More)
Image authentication is done by embedding image/ message in spatial domain or frequency domain. A mask is chosen from the source image in row major order. Bits of the authenticating image are embedded in each byte of the source image block where the position is chosen using hash function. A hash function is a function that takes variable size inputs and(More)
  • 1