@inproceedings{152df61ee3e546ea8558f0e216a56e54,
title = "Chaos-based image integrity authentication code",
abstract = "With the popularity of the Internet, image transmission has become easier than before, but the digitization of the image has also become highly vulnerable to tampering attacks over the public network. In this paper, we propose a chaos-based image authentication algorithm which generates an authentication code for each image block. Furthermore, the applications of image integrity are also investigated. Using the chaos-based authentication codes, which are embedded in the elaborately selected pixels, a verifier can protect rightful ownership and detect malicious manipulation of embedded images. The experimental results show that the quality of the embedded image can be highly preserved, and the parts that were tampered with can be correctly located.",
keywords = "Chaos, Image authentication code, Image integrity, Watermarking",
author = "Chen, {Tzung Her} and Huang, {Wei Lun} and Lin, {Chih Yang}",
year = "2010",
doi = "10.1109/IIHMSP.2010.11",
language = "???core.languages.en_GB???",
isbn = "9780769542225",
series = "Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010",
pages = "13--16",
booktitle = "Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010",
note = "6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010 ; Conference date: 15-10-2010 Through 17-10-2010",
}