A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia.

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
N. Nikolaidis C. Kotropoulos I. Pitas Artificial Intelligence and Information Analysis (AIIA) Laboratory Department of Informatics Aristotle University.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Teacher : Hsien-Chu Wu Student : Hsiao-yun Tseng, Chen-ying Lai Speaker : Hsiao-yun Tseng Date : May 10, 2006 Database Temper Detection Techniques Based.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.
Flame and smoke detection method for early real-time detection of a tunnel fire Adviser: Yu-Chiang Li Speaker: Wei-Cheng Wu Date: 2009/09/23 Fire Safety.
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Palette Partition Based Data Hiding for Color Images
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Source : Signal Processing, Volume 133, April 2017, Pages
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Color Image Hidden in a
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
An efficient reversible data hiding method for AMBTC compressed images
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Some Novel Steganographic Methods for Digital Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Information Steganography Using Magic Matrix
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Digital Watermarking for Image Authentication with Localization
Efficient Huffman Decoding
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Chair Professor Chin-Chen Chang Feng Chia University
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Novel Multiple Spatial Watermarking Technique in Color Images
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Information Protection and Recovery with Reversible Data Hiding
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
An Iterative Method for Lossless Data Embedding in BMP Images
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Information Hiding Techniques Using Magic Matrix
Image Based Steganography Using LSB Insertion Technique
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Authors:Bijan G. Mobasseri、Domenick Cinalli
Presentation transcript:

A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Authors : Wen-Chuan Wu Guang-Ruei Ren Adviser : Wen-Chung Kuo Jiin -Chiou Cheng Repoter : Wei-De Hsue

Outlines Sudoku Puzzle Proposed Method Chaotic System The Code Embedding Phase The Tampering Detection Phase Experimental Results and Discussions Conclusions

Sudoku Puzzle An example of a 9 x 9 Sudoku grid

Proposed Method Chaotic System X1= 0.5 X2= 0.25 X3= … ……….… … … … X1= 128 X2= 64 X3= 96 … ……….… … … … chaotic image map

Proposed Method 1234… 4321… 3142… 2413… …………… S X1= 128 X2= 64 X3= 96 … ……….… … … … M B: neighbors of pi I’

Proposed Method The Code Tampering Detection Phase I’

Experimental Results and Discussions

A simple and efficient image authentication technique is proposed in this paper We introduced Sudoku Puzzle and then implemented it as the verification code of the authenticated images The original image and the used Sudoku grid are not needed when we detect data or authenticate the truthfulness.

HASH (R,G,B) RGB … 255 A index RGB … … A hash table(8 bit) User A243 B…… C…… ………