An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System
A new self-embedding and fragile watermarking technique which was used for image integrity authentication was brought up. The assured function of the composite chaotic iterative dynamic system and its initial parameter was put forward. The method using the single pixel value for self-authentication...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 162 |
---|---|
container_issue | |
container_start_page | 159 |
container_title | |
container_volume | |
creator | Shengbing Che Bin Ma Zuguo Che |
description | A new self-embedding and fragile watermarking technique which was used for image integrity authentication was brought up. The assured function of the composite chaotic iterative dynamic system and its initial parameter was put forward. The method using the single pixel value for self-authentication that authenticating bit embedded in the lowest significant bit of the pixel value was brought up. It brought up the prime decomposition function of the pixel value, making the adjacent pixel value completely separated in chaotic calculation. It led up to the facts that no additional information was needed when authenticating, and the algorithm could prevent the safety danger caused by parameter transmission, and it could ascertain the position accurately to a single pixel when tamper occurs, the probability of successful attack was 50%. |
doi_str_mv | 10.1109/IIH-MSP.2008.24 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4604030</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4604030</ieee_id><sourcerecordid>4604030</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-46f3d72a46c294f0cc831bf92c12c7c87e9b0d43c1d0c6266ae404c54dcceaa53</originalsourceid><addsrcrecordid>eNotjk1Lw0AYhBekoNacPXjZP5C6X9nNHmO0NlBRqOKxvN19k642SUkWof_e-DGXgRnmYQi55mzBObO3VbVKnzYvC8FYvhDqjCTW5Mxom0lhcjkjlz-NFZrL7Jwk4_jBJkmbKZZfkH3R0cLDMYYvpNB5uhygCQekVQsN0neIOLQwfIauocWh6YcQ9y29gxE97Tta9u2xH0NEWu6hj8HRahrAL-3-1EE7JZvTGLG9IrMaDiMm_z4nb8uH13KVrp8fq7JYp4GbLKZK19IbAUo7YVXNnMsl39VWOC6ccblBu2NeScc9c1poDaiYcpnyziFAJufk5o8bEHF7HML0_rRVmikmmfwG0Q1Ytg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Shengbing Che ; Bin Ma ; Zuguo Che</creator><creatorcontrib>Shengbing Che ; Bin Ma ; Zuguo Che</creatorcontrib><description>A new self-embedding and fragile watermarking technique which was used for image integrity authentication was brought up. The assured function of the composite chaotic iterative dynamic system and its initial parameter was put forward. The method using the single pixel value for self-authentication that authenticating bit embedded in the lowest significant bit of the pixel value was brought up. It brought up the prime decomposition function of the pixel value, making the adjacent pixel value completely separated in chaotic calculation. It led up to the facts that no additional information was needed when authenticating, and the algorithm could prevent the safety danger caused by parameter transmission, and it could ascertain the position accurately to a single pixel when tamper occurs, the probability of successful attack was 50%.</description><identifier>ISBN: 9780769532783</identifier><identifier>ISBN: 0769532780</identifier><identifier>DOI: 10.1109/IIH-MSP.2008.24</identifier><identifier>LCCN: 2008926135</identifier><language>eng</language><publisher>IEEE</publisher><subject>adaptive ; Authentication ; Chaos ; composite chaotic iterative dynamic system ; Cryptography ; fragile watermarking ; Heuristic algorithms ; intergrity authentication ; Pixel ; self-embedding ; Signal processing algorithms ; Watermarking</subject><ispartof>2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008, p.159-162</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4604030$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4604030$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Shengbing Che</creatorcontrib><creatorcontrib>Bin Ma</creatorcontrib><creatorcontrib>Zuguo Che</creatorcontrib><title>An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System</title><title>2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing</title><addtitle>IIH-MSP</addtitle><description>A new self-embedding and fragile watermarking technique which was used for image integrity authentication was brought up. The assured function of the composite chaotic iterative dynamic system and its initial parameter was put forward. The method using the single pixel value for self-authentication that authenticating bit embedded in the lowest significant bit of the pixel value was brought up. It brought up the prime decomposition function of the pixel value, making the adjacent pixel value completely separated in chaotic calculation. It led up to the facts that no additional information was needed when authenticating, and the algorithm could prevent the safety danger caused by parameter transmission, and it could ascertain the position accurately to a single pixel when tamper occurs, the probability of successful attack was 50%.</description><subject>adaptive</subject><subject>Authentication</subject><subject>Chaos</subject><subject>composite chaotic iterative dynamic system</subject><subject>Cryptography</subject><subject>fragile watermarking</subject><subject>Heuristic algorithms</subject><subject>intergrity authentication</subject><subject>Pixel</subject><subject>self-embedding</subject><subject>Signal processing algorithms</subject><subject>Watermarking</subject><isbn>9780769532783</isbn><isbn>0769532780</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjk1Lw0AYhBekoNacPXjZP5C6X9nNHmO0NlBRqOKxvN19k642SUkWof_e-DGXgRnmYQi55mzBObO3VbVKnzYvC8FYvhDqjCTW5Mxom0lhcjkjlz-NFZrL7Jwk4_jBJkmbKZZfkH3R0cLDMYYvpNB5uhygCQekVQsN0neIOLQwfIauocWh6YcQ9y29gxE97Tta9u2xH0NEWu6hj8HRahrAL-3-1EE7JZvTGLG9IrMaDiMm_z4nb8uH13KVrp8fq7JYp4GbLKZK19IbAUo7YVXNnMsl39VWOC6ccblBu2NeScc9c1poDaiYcpnyziFAJufk5o8bEHF7HML0_rRVmikmmfwG0Q1Ytg</recordid><startdate>200808</startdate><enddate>200808</enddate><creator>Shengbing Che</creator><creator>Bin Ma</creator><creator>Zuguo Che</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200808</creationdate><title>An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System</title><author>Shengbing Che ; Bin Ma ; Zuguo Che</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-46f3d72a46c294f0cc831bf92c12c7c87e9b0d43c1d0c6266ae404c54dcceaa53</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>adaptive</topic><topic>Authentication</topic><topic>Chaos</topic><topic>composite chaotic iterative dynamic system</topic><topic>Cryptography</topic><topic>fragile watermarking</topic><topic>Heuristic algorithms</topic><topic>intergrity authentication</topic><topic>Pixel</topic><topic>self-embedding</topic><topic>Signal processing algorithms</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Shengbing Che</creatorcontrib><creatorcontrib>Bin Ma</creatorcontrib><creatorcontrib>Zuguo Che</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Shengbing Che</au><au>Bin Ma</au><au>Zuguo Che</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System</atitle><btitle>2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing</btitle><stitle>IIH-MSP</stitle><date>2008-08</date><risdate>2008</risdate><spage>159</spage><epage>162</epage><pages>159-162</pages><isbn>9780769532783</isbn><isbn>0769532780</isbn><abstract>A new self-embedding and fragile watermarking technique which was used for image integrity authentication was brought up. The assured function of the composite chaotic iterative dynamic system and its initial parameter was put forward. The method using the single pixel value for self-authentication that authenticating bit embedded in the lowest significant bit of the pixel value was brought up. It brought up the prime decomposition function of the pixel value, making the adjacent pixel value completely separated in chaotic calculation. It led up to the facts that no additional information was needed when authenticating, and the algorithm could prevent the safety danger caused by parameter transmission, and it could ascertain the position accurately to a single pixel when tamper occurs, the probability of successful attack was 50%.</abstract><pub>IEEE</pub><doi>10.1109/IIH-MSP.2008.24</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769532783 |
ispartof | 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008, p.159-162 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4604030 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | adaptive Authentication Chaos composite chaotic iterative dynamic system Cryptography fragile watermarking Heuristic algorithms intergrity authentication Pixel self-embedding Signal processing algorithms Watermarking |
title | An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T09%3A34%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20Adaptive%20and%20Fragile%20Image%20Watermarking%20Algorithm%20Based%20on%20Composite%20Chaotic%20Iterative%20Dynamic%20System&rft.btitle=2008%20International%20Conference%20on%20Intelligent%20Information%20Hiding%20and%20Multimedia%20Signal%20Processing&rft.au=Shengbing%20Che&rft.date=2008-08&rft.spage=159&rft.epage=162&rft.pages=159-162&rft.isbn=9780769532783&rft.isbn_list=0769532780&rft_id=info:doi/10.1109/IIH-MSP.2008.24&rft_dat=%3Cieee_6IE%3E4604030%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4604030&rfr_iscdi=true |