DocumentCode :
3085969
Title :
Chaos-Based Image Integrity Authentication Code
Author :
Chen, Tzung-Her ; Huang, Wei-Lun ; Lin, Chih-Yang
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Nat. Chiayi Univ., Chiayi, Taiwan
fYear :
2010
fDate :
15-17 Oct. 2010
Firstpage :
13
Lastpage :
16
Abstract :
With the popularity of the Internet, image transmission has become easier than before, but the digitization of the image has also become highly vulnerable to tampering attacks over the public network. In this paper, we propose a chaos-based image authentication algorithm which generates an authentication code for each image block. Furthermore, the applications of image integrity are also investigated. Using the chaos-based authentication codes, which are embedded in the elaborately selected pixels, a verifier can protect rightful ownership and detect malicious manipulation of embedded images. The experimental results show that the quality of the embedded image can be highly preserved, and the parts that were tampered with can be correctly located.
Keywords :
embedded systems; image coding; security of data; Internet; chaos based image authentication; chaos based image integrity authentication code; embedded image; image transmission; malicious manipulation detection; tampering attacks; Authentication; Chaotic communication; Cryptography; Feature extraction; Logistics; Pixel; chaos; image authentication code; image integrity; watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on
Conference_Location :
Darmstadt
Print_ISBN :
978-1-4244-8378-5
Electronic_ISBN :
978-0-7695-4222-5
Type :
conf
DOI :
10.1109/IIHMSP.2010.11
Filename :
5635784
Link To Document :
بازگشت