An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System

A new self-embedding and fragile watermarking technique which was used for image integrity authentication was brought up. The assured function of the composite chaotic iterative dynamic system and its initial parameter was put forward. The method using the single pixel value for self-authentication...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Shengbing Che, Bin Ma, Zuguo Che
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 162
container_issue
container_start_page 159
container_title
container_volume
creator Shengbing Che
Bin Ma
Zuguo Che
description A new self-embedding and fragile watermarking technique which was used for image integrity authentication was brought up. The assured function of the composite chaotic iterative dynamic system and its initial parameter was put forward. The method using the single pixel value for self-authentication that authenticating bit embedded in the lowest significant bit of the pixel value was brought up. It brought up the prime decomposition function of the pixel value, making the adjacent pixel value completely separated in chaotic calculation. It led up to the facts that no additional information was needed when authenticating, and the algorithm could prevent the safety danger caused by parameter transmission, and it could ascertain the position accurately to a single pixel when tamper occurs, the probability of successful attack was 50%.
doi_str_mv 10.1109/IIH-MSP.2008.24
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4604030</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4604030</ieee_id><sourcerecordid>4604030</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-46f3d72a46c294f0cc831bf92c12c7c87e9b0d43c1d0c6266ae404c54dcceaa53</originalsourceid><addsrcrecordid>eNotjk1Lw0AYhBekoNacPXjZP5C6X9nNHmO0NlBRqOKxvN19k642SUkWof_e-DGXgRnmYQi55mzBObO3VbVKnzYvC8FYvhDqjCTW5Mxom0lhcjkjlz-NFZrL7Jwk4_jBJkmbKZZfkH3R0cLDMYYvpNB5uhygCQekVQsN0neIOLQwfIauocWh6YcQ9y29gxE97Tta9u2xH0NEWu6hj8HRahrAL-3-1EE7JZvTGLG9IrMaDiMm_z4nb8uH13KVrp8fq7JYp4GbLKZK19IbAUo7YVXNnMsl39VWOC6ccblBu2NeScc9c1poDaiYcpnyziFAJufk5o8bEHF7HML0_rRVmikmmfwG0Q1Ytg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Shengbing Che ; Bin Ma ; Zuguo Che</creator><creatorcontrib>Shengbing Che ; Bin Ma ; Zuguo Che</creatorcontrib><description>A new self-embedding and fragile watermarking technique which was used for image integrity authentication was brought up. The assured function of the composite chaotic iterative dynamic system and its initial parameter was put forward. The method using the single pixel value for self-authentication that authenticating bit embedded in the lowest significant bit of the pixel value was brought up. It brought up the prime decomposition function of the pixel value, making the adjacent pixel value completely separated in chaotic calculation. It led up to the facts that no additional information was needed when authenticating, and the algorithm could prevent the safety danger caused by parameter transmission, and it could ascertain the position accurately to a single pixel when tamper occurs, the probability of successful attack was 50%.</description><identifier>ISBN: 9780769532783</identifier><identifier>ISBN: 0769532780</identifier><identifier>DOI: 10.1109/IIH-MSP.2008.24</identifier><identifier>LCCN: 2008926135</identifier><language>eng</language><publisher>IEEE</publisher><subject>adaptive ; Authentication ; Chaos ; composite chaotic iterative dynamic system ; Cryptography ; fragile watermarking ; Heuristic algorithms ; intergrity authentication ; Pixel ; self-embedding ; Signal processing algorithms ; Watermarking</subject><ispartof>2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008, p.159-162</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4604030$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4604030$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Shengbing Che</creatorcontrib><creatorcontrib>Bin Ma</creatorcontrib><creatorcontrib>Zuguo Che</creatorcontrib><title>An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System</title><title>2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing</title><addtitle>IIH-MSP</addtitle><description>A new self-embedding and fragile watermarking technique which was used for image integrity authentication was brought up. The assured function of the composite chaotic iterative dynamic system and its initial parameter was put forward. The method using the single pixel value for self-authentication that authenticating bit embedded in the lowest significant bit of the pixel value was brought up. It brought up the prime decomposition function of the pixel value, making the adjacent pixel value completely separated in chaotic calculation. It led up to the facts that no additional information was needed when authenticating, and the algorithm could prevent the safety danger caused by parameter transmission, and it could ascertain the position accurately to a single pixel when tamper occurs, the probability of successful attack was 50%.</description><subject>adaptive</subject><subject>Authentication</subject><subject>Chaos</subject><subject>composite chaotic iterative dynamic system</subject><subject>Cryptography</subject><subject>fragile watermarking</subject><subject>Heuristic algorithms</subject><subject>intergrity authentication</subject><subject>Pixel</subject><subject>self-embedding</subject><subject>Signal processing algorithms</subject><subject>Watermarking</subject><isbn>9780769532783</isbn><isbn>0769532780</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjk1Lw0AYhBekoNacPXjZP5C6X9nNHmO0NlBRqOKxvN19k642SUkWof_e-DGXgRnmYQi55mzBObO3VbVKnzYvC8FYvhDqjCTW5Mxom0lhcjkjlz-NFZrL7Jwk4_jBJkmbKZZfkH3R0cLDMYYvpNB5uhygCQekVQsN0neIOLQwfIauocWh6YcQ9y29gxE97Tta9u2xH0NEWu6hj8HRahrAL-3-1EE7JZvTGLG9IrMaDiMm_z4nb8uH13KVrp8fq7JYp4GbLKZK19IbAUo7YVXNnMsl39VWOC6ccblBu2NeScc9c1poDaiYcpnyziFAJufk5o8bEHF7HML0_rRVmikmmfwG0Q1Ytg</recordid><startdate>200808</startdate><enddate>200808</enddate><creator>Shengbing Che</creator><creator>Bin Ma</creator><creator>Zuguo Che</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200808</creationdate><title>An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System</title><author>Shengbing Che ; Bin Ma ; Zuguo Che</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-46f3d72a46c294f0cc831bf92c12c7c87e9b0d43c1d0c6266ae404c54dcceaa53</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>adaptive</topic><topic>Authentication</topic><topic>Chaos</topic><topic>composite chaotic iterative dynamic system</topic><topic>Cryptography</topic><topic>fragile watermarking</topic><topic>Heuristic algorithms</topic><topic>intergrity authentication</topic><topic>Pixel</topic><topic>self-embedding</topic><topic>Signal processing algorithms</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Shengbing Che</creatorcontrib><creatorcontrib>Bin Ma</creatorcontrib><creatorcontrib>Zuguo Che</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Shengbing Che</au><au>Bin Ma</au><au>Zuguo Che</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System</atitle><btitle>2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing</btitle><stitle>IIH-MSP</stitle><date>2008-08</date><risdate>2008</risdate><spage>159</spage><epage>162</epage><pages>159-162</pages><isbn>9780769532783</isbn><isbn>0769532780</isbn><abstract>A new self-embedding and fragile watermarking technique which was used for image integrity authentication was brought up. The assured function of the composite chaotic iterative dynamic system and its initial parameter was put forward. The method using the single pixel value for self-authentication that authenticating bit embedded in the lowest significant bit of the pixel value was brought up. It brought up the prime decomposition function of the pixel value, making the adjacent pixel value completely separated in chaotic calculation. It led up to the facts that no additional information was needed when authenticating, and the algorithm could prevent the safety danger caused by parameter transmission, and it could ascertain the position accurately to a single pixel when tamper occurs, the probability of successful attack was 50%.</abstract><pub>IEEE</pub><doi>10.1109/IIH-MSP.2008.24</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780769532783
ispartof 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008, p.159-162
issn
language eng
recordid cdi_ieee_primary_4604030
source IEEE Electronic Library (IEL) Conference Proceedings
subjects adaptive
Authentication
Chaos
composite chaotic iterative dynamic system
Cryptography
fragile watermarking
Heuristic algorithms
intergrity authentication
Pixel
self-embedding
Signal processing algorithms
Watermarking
title An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T09%3A34%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20Adaptive%20and%20Fragile%20Image%20Watermarking%20Algorithm%20Based%20on%20Composite%20Chaotic%20Iterative%20Dynamic%20System&rft.btitle=2008%20International%20Conference%20on%20Intelligent%20Information%20Hiding%20and%20Multimedia%20Signal%20Processing&rft.au=Shengbing%20Che&rft.date=2008-08&rft.spage=159&rft.epage=162&rft.pages=159-162&rft.isbn=9780769532783&rft.isbn_list=0769532780&rft_id=info:doi/10.1109/IIH-MSP.2008.24&rft_dat=%3Cieee_6IE%3E4604030%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4604030&rfr_iscdi=true