Chaos-Based Image Integrity Authentication Code

With the popularity of the Internet, image transmission has become easier than before, but the digitization of the image has also become highly vulnerable to tampering attacks over the public network. In this paper, we propose a chaos-based image authentication algorithm which generates an authentication code for each image block. Furthermore, the applications of image integrity are also investigated. Using the chaos-based authentication codes, which are embedded in the elaborately selected pixels, a verifier can protect rightful ownership and detect malicious manipulation of embedded images. The experimental results show that the quality of the embedded image can be highly preserved, and the parts that were tampered with can be correctly located.

[1]  S. M. Ulam,et al.  On Combination of Stochastic and Deterministic Processes , 1947 .

[2]  Amir Akhavan,et al.  Applications of tripled chaotic maps in cryptography , 2007, 0705.2633.

[3]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[4]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[5]  X. Liao,et al.  One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .

[6]  Bart Preneel,et al.  Integrity Primitives for Secure Information Systems , 2005, Lecture Notes in Computer Science.

[7]  Sasaki Yu,et al.  Improved Collision Attack on MD5 , 2005 .

[8]  Dengguo Feng,et al.  Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..

[9]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[10]  Yu Sasaki,et al.  Improved Collision Attack on MD4 with Probability Almost 1 , 2005, ICISC.

[11]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[12]  H. H. Nien,et al.  Digital color image encoding and decoding using a novel chaotic random generator , 2007 .

[13]  Kwok-Wo Wong,et al.  One-way hash function construction based on chaotic map network , 2009 .

[14]  Joos Vandewalle,et al.  Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.

[15]  Mihir Bellare,et al.  The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..

[16]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[17]  A. Kanso,et al.  Logistic chaotic maps for binary numbers generations , 2009 .

[18]  Zengqiang Chen,et al.  Image encryption based on a new total shuffling algorithm , 2008 .

[19]  Tao Xiang,et al.  Parallel image encryption algorithm based on discretized chaotic map , 2008 .

[20]  Hui Chen,et al.  Cryptanalysis of the Hash Functions MD4 and RIPEMD , 2005, EUROCRYPT.