z-logo
open-access-imgOpen Access
A novel image authentication and recovery algorithm based on chaos and Hamming code
Author(s) -
Xingyuan Wang,
Zhang Ji-Ming
Publication year - 2014
Publication title -
wuli xuebao
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.199
H-Index - 47
ISSN - 1000-3290
DOI - 10.7498/aps.63.020701
Subject(s) - computer science , hamming code , chaos (operating system) , algorithm , hamming distance , authentication (law) , code (set theory) , coding (social sciences) , image (mathematics) , digital watermarking , chaotic , embedding , cryptography , error detection and correction , theoretical computer science , artificial intelligence , mathematics , block code , decoding methods , computer security , statistics , set (abstract data type) , programming language
In this article, we propose an image authentication and a recovery algorithm based on chaos and Hamming code. In this algorithm, the Hamming code that is widely used in the channel coding is used, the error control is applied to the image authentication and recovery, and the validity and security of the algorithm are ensured by chaotic mapping. Analytical and experimental results show that the algorithm has a good visual effect and an effectively tampering detection ability with less embedding authentication information, at the same time the algorithm can recover a tampered image to some extent.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here