Value combination technique for image authentication

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Value Combination Technique is proposed for a novel bitmap exact authentication. It combines the pixel values in an image block with the block position, and the combined values are used as the initial state of chaotic system to generate watermark. Furthermore, a general rule is given to analyze the reliability of algorithm, and another rule is presented to design an algorithm with high reliability in this paper. Then, a concrete algorithm illustrates our proposed authentication system. Extensive experiments show that this system can effectively resist such as feature extraction attack, vector quantization attack and so on, and be very sensitive to tamper. © Springer-Verlag Berlin Heidelberg 2007.

References Powered by Scopus

Secret and public key image watermarking schemes for image authentication and ownership verification

533Citations
N/AReaders
Get full text

On the dynamical degradation of digital piecewise linear chaotic maps

371Citations
N/AReaders
Get full text

When seeing isn't believing

170Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Intelligent Machine Learning in Image Authentication

1Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Zhang, J., Liu, F., Wang, P., & Wang, G. (2007). Value combination technique for image authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4810 LNCS, pp. 276–285). Springer Verlag. https://doi.org/10.1007/978-3-540-77255-2_30

Save time finding and organizing research with Mendeley

Sign up for free