A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle.
Wen-Chuan WuGuang-Ruei RenPublished in: IIH-MSP (2009)
Keyphrases
- image authentication
- chaotic map
- image encryption
- authentication scheme
- piecewise linear
- public key
- hash functions
- smart card
- s box
- watermarking scheme
- secret key
- jpeg compression
- security analysis
- image content
- user authentication
- digital watermarking
- copyright protection
- authentication protocol
- high dimensional
- similarity search
- lightweight
- image compression
- knn