DocumentCode
3085969
Title
Chaos-Based Image Integrity Authentication Code
Author
Chen, Tzung-Her ; Huang, Wei-Lun ; Lin, Chih-Yang
Author_Institution
Dept. of Comput. Sci. & Inf. Eng., Nat. Chiayi Univ., Chiayi, Taiwan
fYear
2010
fDate
15-17 Oct. 2010
Firstpage
13
Lastpage
16
Abstract
With the popularity of the Internet, image transmission has become easier than before, but the digitization of the image has also become highly vulnerable to tampering attacks over the public network. In this paper, we propose a chaos-based image authentication algorithm which generates an authentication code for each image block. Furthermore, the applications of image integrity are also investigated. Using the chaos-based authentication codes, which are embedded in the elaborately selected pixels, a verifier can protect rightful ownership and detect malicious manipulation of embedded images. The experimental results show that the quality of the embedded image can be highly preserved, and the parts that were tampered with can be correctly located.
Keywords
embedded systems; image coding; security of data; Internet; chaos based image authentication; chaos based image integrity authentication code; embedded image; image transmission; malicious manipulation detection; tampering attacks; Authentication; Chaotic communication; Cryptography; Feature extraction; Logistics; Pixel; chaos; image authentication code; image integrity; watermarking;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on
Conference_Location
Darmstadt
Print_ISBN
978-1-4244-8378-5
Electronic_ISBN
978-0-7695-4222-5
Type
conf
DOI
10.1109/IIHMSP.2010.11
Filename
5635784
Link To Document