A Chaotic-Based Digital Watermarking Algorithm for Tag Tamper Detection

被引:0
|
作者
Zhao Shuxu [1 ]
Yue Qingsheng [1 ]
机构
[1] Lanzhou Jiaotong Univ, Sch Elect & Informat Engn, Lanzhou, Gansu, Peoples R China
关键词
component; RFID tag; Tamper detection; Integer piecewise linear chaotic maps; Digital watermarking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID tags has been used more widely, but the tag information is easy to be tampered, so its tampering detection has become a focus in order to ensure information security. An improved digital watermarking algorithm based on chaotic tent mapping has been proposed. In the improved algorithm, integer piecewise linear chaotic tent mapping has been used to improve the watermarking generating and embedding, and enhance the safety and efficiency of the algorithm, at the same time the simultaneous detection of EPC Manager and Object Class segments have been achieved. The proposed solution algorithm conforms to the EPC-Class1 Generation2 specification.
引用
收藏
页码:270 / 274
页数:5
相关论文
共 50 条
  • [31] Audio Digital Signature Algorithm with Tamper Detection
    Yang, Xiaoyuan
    Wu, Xiang
    Zhang, Minqing
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 15 - 18
  • [32] Watermarking for tamper detection and recovery
    Park, Youngran
    Kang, Hyunho
    Yamaguchi, Kazuhiko
    Kobayashi, Kingo
    IEICE ELECTRONICS EXPRESS, 2008, 5 (17) : 689 - 696
  • [33] Watermarking based image authentication and tamper detection algorithm using vector quantization approach
    Tiwari, Archana
    Sharma, Manisha
    Tamrakar, Raunak Kumar
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2017, 78 : 114 - 123
  • [34] Image watermarking for tamper detection
    Fridrich, J
    1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, 1998, : 404 - 408
  • [35] The application of chaotic oscillators to digital watermarking detection
    Wen, Q
    Wang, SX
    Zhu, KY
    PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS & SIGNAL PROCESSING, PROCEEDINGS, VOLS 1 AND 2, 2003, : 1513 - 1516
  • [36] Epoch event based speech watermarking for tamper detection
    Kumar, Rajeev
    Yadav, Jainath
    INDIAN JOURNAL OF ENGINEERING AND MATERIALS SCIENCES, 2024, 31 (02) : 258 - 269
  • [37] Digital watermarking based on tamper proofing using hamming code
    Sentaro, Okamoto
    Katumi, Iio
    Ryuji, Hamabe
    IEEJ Transactions on Electronics, Information and Systems, 2009, 129 (09): : 1768 - 1769
  • [38] Blind Audio Watermarking for Tamper Detection Based on LSB
    Ghobadi, Alireza
    Boroujerdizadeh, A.
    Yaribakht, A. H.
    Karimi, Roozbeh
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1077 - 1082
  • [39] Multiple Watermarking On Digital Medical Images for Tamper Detection and Integrity Control
    Kurniawan, M. T.
    Adiwijaya
    Agung, Wiseto
    2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), 2012, : 145 - 148
  • [40] A watermarking algorithm based on chaotic maps
    Tang, GP
    Li, CD
    WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2, 2004, : 168 - 174