A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Authors : Wen-Chuan Wu Guang-Ruei Ren Adviser : Wen-Chung Kuo Jiin -Chiou Cheng Repoter : Wei-De Hsue
Outlines Sudoku Puzzle Proposed Method Chaotic System The Code Embedding Phase The Tampering Detection Phase Experimental Results and Discussions Conclusions
Sudoku Puzzle An example of a 9 x 9 Sudoku grid
Proposed Method Chaotic System X1= 0.5 X2= 0.25 X3= … ……….… … … … X1= 128 X2= 64 X3= 96 … ……….… … … … chaotic image map
Proposed Method 1234… 4321… 3142… 2413… …………… S X1= 128 X2= 64 X3= 96 … ……….… … … … M B: neighbors of pi I’
Proposed Method The Code Tampering Detection Phase I’
Experimental Results and Discussions
A simple and efficient image authentication technique is proposed in this paper We introduced Sudoku Puzzle and then implemented it as the verification code of the authenticated images The original image and the used Sudoku grid are not needed when we detect data or authenticate the truthfulness.
HASH (R,G,B) RGB … 255 A index RGB … … A hash table(8 bit) User A243 B…… C…… ………