Chaos-based image integrity authentication code

Tzung Her Chen, Wei Lun Huang, Chih Yang Lin

研究成果: 書貢獻/報告類型會議論文篇章同行評審

3 引文 斯高帕斯(Scopus)

摘要

With the popularity of the Internet, image transmission has become easier than before, but the digitization of the image has also become highly vulnerable to tampering attacks over the public network. In this paper, we propose a chaos-based image authentication algorithm which generates an authentication code for each image block. Furthermore, the applications of image integrity are also investigated. Using the chaos-based authentication codes, which are embedded in the elaborately selected pixels, a verifier can protect rightful ownership and detect malicious manipulation of embedded images. The experimental results show that the quality of the embedded image can be highly preserved, and the parts that were tampered with can be correctly located.

原文???core.languages.en_GB???
主出版物標題Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010
頁面13-16
頁數4
DOIs
出版狀態已出版 - 2010
事件6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010 - Darmstadt, Germany
持續時間: 15 10月 201017 10月 2010

出版系列

名字Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010

???event.eventtypes.event.conference???

???event.eventtypes.event.conference???6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010
國家/地區Germany
城市Darmstadt
期間15/10/1017/10/10

指紋

深入研究「Chaos-based image integrity authentication code」主題。共同形成了獨特的指紋。

引用此