2014
Varsaki, Eleni; Fotopoulos, Vasileios; Skodras, Athanassios
A discrete Gould transform data hiding scheme Journal Article
In: Mathematical Methods in the Applied Sciences, vol. 37, no. 2, pp. 283-288, 2014.
Abstract | Links | BibTeX | Tags: data hiding, fragile watermarking, Gould transform
@article{Varsaki2014,
title = {A discrete Gould transform data hiding scheme},
author = {Eleni Varsaki and Vasileios Fotopoulos and Athanassios Skodras},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/mma.3041},
doi = {10.1002/mma.3041},
year = {2014},
date = {2014-01-01},
journal = {Mathematical Methods in the Applied Sciences},
volume = {37},
number = {2},
pages = {283-288},
abstract = {Discrete Gould transform has been recently introduced in image processing. This paper proposes a data hiding scheme that uses the discrete Gould transform in order to invisibly embed a secret message. The Gould coefficients represent the differences between neighboring pixels. Small changes of the coefficients generate even smaller changes to the pixels. By this, a high capacity fragile steganographic technique is achieved. The message is easily destroyed after any manipulation, and therefore, its absence can prove that the image has been altered in some way. Because of this property, the proposed technique finds application in image authentication and tamper proofing.},
keywords = {data hiding, fragile watermarking, Gould transform},
pubstate = {published},
tppubtype = {article}
}
Discrete Gould transform has been recently introduced in image processing. This paper proposes a data hiding scheme that uses the discrete Gould transform in order to invisibly embed a secret message. The Gould coefficients represent the differences between neighboring pixels. Small changes of the coefficients generate even smaller changes to the pixels. By this, a high capacity fragile steganographic technique is achieved. The message is easily destroyed after any manipulation, and therefore, its absence can prove that the image has been altered in some way. Because of this property, the proposed technique finds application in image authentication and tamper proofing.