- 3
- 0
- 约1.32千字
- 约 12页
- 2018-06-24 发布于四川
- 举报
A New Approach to Image Authentication Using Chaotic Map :利用混沌映射的图像认证的一种新方法
A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Authors : Wen-Chuan Wu Guang-Ruei Ren Adviser:Wen-Chung Kuo Jiin -Chiou Cheng Repoter:Wei-De Hsue Outlines Sudoku Puzzle Proposed Method Chaotic System The Code Embedding Phase The Tampering Detection Phase Experimental Results and Discussions Conclusions Sudoku Puzzle An example of a 9 x 9 Sudoku grid Proposed Method Chaotic System X1= 0.5 X2= 0.25 X3= 0.375 … … … …. … … …. … … X1= 128 X2= 64 X3= 96 … … … …. … … …. … … chaotic image map Proposed Method 1 2 3 4 … 4 3 2 1 … 3 1 4 2 … 2 4 1 3 … … … … … … S X1= 128 X2= 64 X3= 96 … … … …. … … …. … … M B: neighbors of pi I’ Proposed Method The Code Tampering Detection Phase I’ Experimental Results and Discussions A simple and efficient image authentication technique is proposed in this paper We introduced Sudoku Puzzle and then implemented it as the verification code of the authenticated images The original image and the used Sudoku grid are not needed when we detect data or authenticate the truthfulness. HASH (R,G,B) R G B 1 2 3 10 50 3 43 30 34 156 58 … 255 A index R G B 1 2 3 30 34 156 … 58 3 10 50 … 255 3 58 A hash table(8 bit) User A 2 43 B … … C … … … … …
原创力文档

文档评论(0)