Font Size: a A A

Image Authentication And Recovery Algorithm Based On Chaos

Posted on:2015-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:J M ZhangFull Text:PDF
GTID:2298330467480322Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, the development of multimedia and network technology has facilitated the production and distribution of image content. However, the ease of digital image editing and copying also enables unauthorized tampering and use of the image content. The design of a class method can be used for digital image authentication and repair is necessary. Chaos-based technology of digital image authentication embeds or generates image certification and repair information, can effectively detect image tamper, and can repair tampered image. This dissertation concentrates on the chaotic system based digital image tamper detection and image restoration. The main contribution can be summarized as follows:(1) A color image authentication based on block mean and double chaotic maps. Generate image authentication information by chaos can overcomes the shortcomings of traditional based on block-means algorithm. Algorithm has a good performance which can improve the color image tamper detection and localization ability, effectively resists the forgery attacks which retain block mean constant, and effectively reduces correlations of image blocks with twice chaos mapping.(2) An image authentication and recovery algorithm based on chaos and Hamming code. This algorithm use the Hamming code widely used in the channel coding and the error control to detect image temper and recovery tempered image. Using of chaotic maps to ensure the effectiveness and safety. In the same time, algorithm can recover temper image.(3) A digital image tamper detection and recovery algorithm based on dither and chaos technology. Use dither to generate image certification and repair information by low frequency and embedded into high frequency sub-diagram. Chaos technology used to complete watermark embedding and encryption, combined with Chinese remainder theorem, further reducing the impact of the image quality.
Keywords/Search Tags:Chaos, Image authentication, Tamper detection, Image restoration
PDF Full Text Request
Related items