Title :
A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle
Author :
Wu, Wen-Chuan ; Ren, Guang-Ruei
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Aletheia Univ., Taipei, Taiwan
Abstract :
In this paper, a novel image authentication scheme is proposed based on Sudoku puzzle. The goal of this scheme is to verify the integrity of an image against network attackers with malice. Sudoku is a logic-based combinatorial number-placement puzzle. Sudoku rule as its name means that the digits must be single. Here, it is used to be the verification code, instead of material watermarks, for the image. In this way the message receiver will not hold the verification code or watermarks when in the tampering detection. He or she only needs to examine the validity of the Sudoku grid. Simulation results showed that the proposed scheme can detect any an alteration and accurately mark where the tampered regions are.
Keywords :
combinatorial mathematics; data integrity; image coding; message authentication; Sudoku puzzle rule; chaotic map; image authentication scheme; image integrity verification code; image watermarking; logic-based combinatorial number-placement puzzle; network attack; simulation result; tampering detection; Authentication; Chaos; Computer science; Data security; Internet; Pixel; Problem-solving; Protection; Signal processing; Watermarking; Authentication; Chaotic system; Sudoku puzzle; and modulo operation;
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09. Fifth International Conference on
Conference_Location :
Kyoto
Print_ISBN :
978-1-4244-4717-6
Electronic_ISBN :
978-0-7695-3762-7
DOI :
10.1109/IIH-MSP.2009.279