• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Xingyuan and Shi Qijiang. An Image Authentication Algorithm Based on Feature of Original Image and Hyperchaotic Iteration[J]. Journal of Computer Research and Development, 2005, 42(11): 1896-1902.
Citation: Wang Xingyuan and Shi Qijiang. An Image Authentication Algorithm Based on Feature of Original Image and Hyperchaotic Iteration[J]. Journal of Computer Research and Development, 2005, 42(11): 1896-1902.

An Image Authentication Algorithm Based on Feature of Original Image and Hyperchaotic Iteration

More Information
  • Published Date: November 14, 2005
  • An image authentication algorithm based on feature of image and hyperchaotic iteration is proposed. The stable feature value is attained by extracting the edge of low-frequency components from wavelet transform of the original image. In order to get the indices set, hyperchaotic iteration is executed by combining the value with the information of watermarking. So the indices set is signed and timestamped by the owner and the trusted third party's private keys. By using the public keys, the image of watermark can be authenticated without the original image. The experimental results show the algorithm is robust to noise adding, filtering, compression, rotation.
  • Related Articles

    [1]Wang Guohua, David Hung-Chang Du, Wu Fenggang, Liu Shiyong. Survey on High Density Magnetic Recording Technology[J]. Journal of Computer Research and Development, 2018, 55(9): 2016-2028. DOI: 10.7544/issn1000-1239.2018.20180264
    [2]He Wenbin, Liu Qunfeng, Xiong Jinzhi. The Error Theory of Polynomial Smoothing Functions for Support Vector Machines[J]. Journal of Computer Research and Development, 2016, 53(7): 1576-1585. DOI: 10.7544/issn1000-1239.2016.20148462
    [3]Bi Anqi, Dong Aimei, Wang Shitong. A Dynamic Data Stream Clustering Algorithm Based on Probability and Exemplar[J]. Journal of Computer Research and Development, 2016, 53(5): 1029-1042. DOI: 10.7544/issn1000-1239.2016.20148428
    [4]Wang Lijin, Zhong Yiwen, Yin Yilong. Orthogonal Crossover Cuckoo Search Algorithm with External Archive[J]. Journal of Computer Research and Development, 2015, 52(11): 2496-2507. DOI: 10.7544/issn1000-1239.2015.20148042
    [5]Xu Min, Deng Zhaohong, Wang Shitong, Shi Yingzhong. MMCKDE: m-Mixed Clustering Kernel Density Estimation over Data Streams[J]. Journal of Computer Research and Development, 2014, 51(10): 2277-2294. DOI: 10.7544/issn1000-1239.2014.20130718
    [6]Shen Yue, Guo Longjiang, Li Jinbao. Density and Distance Based Probabilistic Broadcasting Algorithm in Mobile Sensor Networks[J]. Journal of Computer Research and Development, 2014, 51(1): 151-160.
    [7]Zong Dan, Li Chunpeng, Xia Shihong, Wang Zhaoqi. Key-Postures Based Automated Construction of Motion Graph[J]. Journal of Computer Research and Development, 2010, 47(8): 1321-1328.
    [8]Xiong Jinzhi, Yuan Huaqiang, Peng Hong. A General Formulation of Polynomial Smooth Support Vector Machines[J]. Journal of Computer Research and Development, 2008, 45(8): 1346-1353.
    [9]Song Yuqing, Xie Conghua, Zhu Yuquan, Li Cunhua, Chen Jianmei, Wang Lijun. Research on Medical Image Clustering Based on Approximate Density Function[J]. Journal of Computer Research and Development, 2006, 43(11): 1947-1952.
    [10]Chen Jun and Wang Guojin. Constructing Convexity-Preserving Interpolation Curves of Hyperbolic Polynomial B-Splines Using a Shape Parameter[J]. Journal of Computer Research and Development, 2006, 43(7): 1216-1224.

Catalog

    Article views (766) PDF downloads (709) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return