Presentation is loading. Please wait.

Presentation is loading. Please wait.

A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia.

Similar presentations


Presentation on theme: "A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia."— Presentation transcript:

1 A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Authors : Wen-Chuan Wu Guang-Ruei Ren Adviser : Wen-Chung Kuo Jiin -Chiou Cheng Repoter : Wei-De Hsue

2 Outlines Sudoku Puzzle Proposed Method Chaotic System The Code Embedding Phase The Tampering Detection Phase Experimental Results and Discussions Conclusions

3 Sudoku Puzzle An example of a 9 x 9 Sudoku grid

4 Proposed Method Chaotic System X1= 0.5 X2= 0.25 X3= 0.375 … ……….… … … … X1= 128 X2= 64 X3= 96 … ……….… … … … chaotic image map

5 Proposed Method 1234… 4321… 3142… 2413… …………… S X1= 128 X2= 64 X3= 96 … ……….… … … … M B: neighbors of pi I’

6 Proposed Method The Code Tampering Detection Phase I’

7 Experimental Results and Discussions

8

9

10 A simple and efficient image authentication technique is proposed in this paper We introduced Sudoku Puzzle and then implemented it as the verification code of the authenticated images The original image and the used Sudoku grid are not needed when we detect data or authenticate the truthfulness.

11 HASH (R,G,B) RGB 1 231050 3 433034156 58 … 255 A index RGB 1 2 33034156 … 5831050 … 255 3 58 A hash table(8 bit) User A243 B…… C…… ………

12


Download ppt "A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia."

Similar presentations


Ads by Google