The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Uma marca d'água de autenticação auxiliada por vizinho baseada em um sistema caótico com feedback é proposta neste artigo. Este algoritmo pode não apenas detectar manipulações maliciosas, mas também revelar substituições de blocos quando ocorre o ataque VQ. Uma imagem é particionada em blocos não sobrepostos. Os pixels de um bloco e do bloco vizinho são combinados para produzir uma marca d'água de autenticação baseada em um sistema caótico com feedback, que é sensível ao valor inicial. A marca d'água produzida é incorporada ao bloco atual. Durante a detecção, o detector primeiro extrai a marca d'água, depois gera uma sequência de referência e a compara com a marca d'água extraída para autenticar a integridade da imagem e localizar as regiões adulteradas. Resultados experimentais comprovam a eficácia do nosso método.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Rongrong NI, Qiuqi RUAN, "Neighbor-Aided Authentication Watermarking Based on a Chaotic System with Feedback" in IEICE TRANSACTIONS on Information,
vol. E91-D, no. 8, pp. 2196-2198, August 2008, doi: 10.1093/ietisy/e91-d.8.2196.
Abstract: A neighbor-aided authentication watermarking based on a chaotic system with feedback is proposed in this paper. This algorithm can not only detect malicious manipulations but reveal block substitutions when the VQ attack occurs. An image is partitioned into non-overlapped blocks. The pixels in one block and its neighboring block are combined to produce an authentication watermark based on a chaotic system with feedback, which is sensitive to the initial value. The produced watermark is embedded into the current block. During detection, the detector extracts the watermark firstly, then generates a reference sequence and compares it with the extracted watermark to authenticate the integrity of the image and locate the tampered regions. Experimental results prove the effectiveness of our method.
URL: https://global.ieice.org/en_transactions/information/10.1093/ietisy/e91-d.8.2196/_p
Copiar
@ARTICLE{e91-d_8_2196,
author={Rongrong NI, Qiuqi RUAN, },
journal={IEICE TRANSACTIONS on Information},
title={Neighbor-Aided Authentication Watermarking Based on a Chaotic System with Feedback},
year={2008},
volume={E91-D},
number={8},
pages={2196-2198},
abstract={A neighbor-aided authentication watermarking based on a chaotic system with feedback is proposed in this paper. This algorithm can not only detect malicious manipulations but reveal block substitutions when the VQ attack occurs. An image is partitioned into non-overlapped blocks. The pixels in one block and its neighboring block are combined to produce an authentication watermark based on a chaotic system with feedback, which is sensitive to the initial value. The produced watermark is embedded into the current block. During detection, the detector extracts the watermark firstly, then generates a reference sequence and compares it with the extracted watermark to authenticate the integrity of the image and locate the tampered regions. Experimental results prove the effectiveness of our method.},
keywords={},
doi={10.1093/ietisy/e91-d.8.2196},
ISSN={1745-1361},
month={August},}
Copiar
TY - JOUR
TI - Neighbor-Aided Authentication Watermarking Based on a Chaotic System with Feedback
T2 - IEICE TRANSACTIONS on Information
SP - 2196
EP - 2198
AU - Rongrong NI
AU - Qiuqi RUAN
PY - 2008
DO - 10.1093/ietisy/e91-d.8.2196
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E91-D
IS - 8
JA - IEICE TRANSACTIONS on Information
Y1 - August 2008
AB - A neighbor-aided authentication watermarking based on a chaotic system with feedback is proposed in this paper. This algorithm can not only detect malicious manipulations but reveal block substitutions when the VQ attack occurs. An image is partitioned into non-overlapped blocks. The pixels in one block and its neighboring block are combined to produce an authentication watermark based on a chaotic system with feedback, which is sensitive to the initial value. The produced watermark is embedded into the current block. During detection, the detector extracts the watermark firstly, then generates a reference sequence and compares it with the extracted watermark to authenticate the integrity of the image and locate the tampered regions. Experimental results prove the effectiveness of our method.
ER -