Chaos-based image integrity authentication code

Tzung Her Chen, Wei Lun Huang, Chih Yang Lin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

With the popularity of the Internet, image transmission has become easier than before, but the digitization of the image has also become highly vulnerable to tampering attacks over the public network. In this paper, we propose a chaos-based image authentication algorithm which generates an authentication code for each image block. Furthermore, the applications of image integrity are also investigated. Using the chaos-based authentication codes, which are embedded in the elaborately selected pixels, a verifier can protect rightful ownership and detect malicious manipulation of embedded images. The experimental results show that the quality of the embedded image can be highly preserved, and the parts that were tampered with can be correctly located.

Original languageEnglish
Title of host publicationProceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010
Pages13-16
Number of pages4
DOIs
StatePublished - 2010
Event6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010 - Darmstadt, Germany
Duration: 15 Oct 201017 Oct 2010

Publication series

NameProceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010

Conference

Conference6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010
Country/TerritoryGermany
CityDarmstadt
Period15/10/1017/10/10

Keywords

  • Chaos
  • Image authentication code
  • Image integrity
  • Watermarking

Fingerprint

Dive into the research topics of 'Chaos-based image integrity authentication code'. Together they form a unique fingerprint.

Cite this