Image Authentication Proofing Scheme Based on RLG by Employing the Characteristics of DCT

Authors

  • Fahmi Ghozzi Department of Electronic, National School of Electronics and Telecommunications of Sfax, University of Sfax, Tunisia
  • Khalid Kadhim Jabbar Department of Computer Science, College of Education, Mustansiriyah University, Baghdad, Iraq https://orcid.org/0000-0001-9894-3346
  • Ahmad Fakhfakh Laboratory of Signals, Systems, Artificial intelligence and Networks (SM@RTS), Digital Research Center of Sfax(CRNS), Sfax, Tunisia

DOI:

https://doi.org/10.24996/ijs.2025.66.9.34

Keywords:

Authentication, DCT, Information Security, Reliability, Watermark

Abstract

The impetus behind the emergence of information security was the need to send sensitive data over the often insecure Internet networks. Information and communication technology fields have used authentication to verify alleged users identities and prevent intruders from achieving their goals. However, with the increasing use of digital images in multimedia applications, particularly those requiring high levels of security, there has been a growing interest in ways to ensure their safety. A secret key was generated randomly to add to the proposed encryption system, increasing its complexity to preserve privacy and reduce the influence of intruders. Our method uses a reversible logical approach for security and privacy based on discrete cosine transforms (DCT) to propose a semi-fragile watermark approach to detect and locate any changes. The results show a high degree of accuracy in verifying and establishing the color image's reliability, all while maintaining image quality during the embedding and retrieval phases. Results showed that the proposed method is very good at finding and locating any manipulation by the intruder on the colored image while maintaining the image quality after the embedding process.

Downloads

Published

2025-09-30

Issue

Section

Computer Science

How to Cite

[1]
F. . Ghozzi, K. K. . Jabbar, and A. . Fakhfakh, “Image Authentication Proofing Scheme Based on RLG by Employing the Characteristics of DCT”, Iraqi Journal of Science, vol. 66, no. 9, pp. 3951–3968, Sep. 2025, doi: 10.24996/ijs.2025.66.9.34.

Similar Articles

1-10 of 643

You may also start an advanced similarity search for this article.