• DocumentCode
    3085969
  • Title

    Chaos-Based Image Integrity Authentication Code

  • Author

    Chen, Tzung-Her ; Huang, Wei-Lun ; Lin, Chih-Yang

  • Author_Institution
    Dept. of Comput. Sci. & Inf. Eng., Nat. Chiayi Univ., Chiayi, Taiwan
  • fYear
    2010
  • fDate
    15-17 Oct. 2010
  • Firstpage
    13
  • Lastpage
    16
  • Abstract
    With the popularity of the Internet, image transmission has become easier than before, but the digitization of the image has also become highly vulnerable to tampering attacks over the public network. In this paper, we propose a chaos-based image authentication algorithm which generates an authentication code for each image block. Furthermore, the applications of image integrity are also investigated. Using the chaos-based authentication codes, which are embedded in the elaborately selected pixels, a verifier can protect rightful ownership and detect malicious manipulation of embedded images. The experimental results show that the quality of the embedded image can be highly preserved, and the parts that were tampered with can be correctly located.
  • Keywords
    embedded systems; image coding; security of data; Internet; chaos based image authentication; chaos based image integrity authentication code; embedded image; image transmission; malicious manipulation detection; tampering attacks; Authentication; Chaotic communication; Cryptography; Feature extraction; Logistics; Pixel; chaos; image authentication code; image integrity; watermarking;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on
  • Conference_Location
    Darmstadt
  • Print_ISBN
    978-1-4244-8378-5
  • Electronic_ISBN
    978-0-7695-4222-5
  • Type

    conf

  • DOI
    10.1109/IIHMSP.2010.11
  • Filename
    5635784