图书馆订阅: Guest
Begell Digital Portal Begell 数字图书馆 电子图书 期刊 参考文献及会议录 研究收集
电信和无线电工程
SJR: 0.202 SNIP: 0.2 CiteScore™: 0.23

ISSN 打印: 0040-2508
ISSN 在线: 1943-6009

卷:
卷 79, 2020 卷 78, 2019 卷 77, 2018 卷 76, 2017 卷 75, 2016 卷 74, 2015 卷 73, 2014 卷 72, 2013 卷 71, 2012 卷 70, 2011 卷 69, 2010 卷 68, 2009 卷 67, 2008 卷 66, 2007 卷 65, 2006 卷 64, 2005 卷 63, 2005 卷 62, 2004 卷 61, 2004 卷 60, 2003 卷 59, 2003 卷 58, 2002 卷 57, 2002 卷 56, 2001 卷 55, 2001 卷 54, 2000 卷 53, 1999 卷 52, 1998 卷 51, 1997

电信和无线电工程

DOI: 10.1615/TelecomRadEng.v67.i19.80
pages 1777-1790

A Novel Verification Scheme for Watermarking Based Image Content Authentication Systems

C. Cruz-Ramos
National Polytechnic Institute of Mexico City
R. Reyes-Reyes
National Polytechnic Institute of Mexico City
J. Mendoza-Noriega
National Polytechnic Institute of Mexico City
Mariko Nakano-Miyatake
National Polytechnic Institute, IPN, Mexico City
Hector Manuel Perez-Meana
National Polytechnic Institute of Mexico

ABSTRACT

In this paper, a verification criterion to reduce false positive and false negative error probability for image content authentication systems is proposed. Many image content authentication algorithms detect content altered region of images, but generally, both false positive and false negative error are considerably high and it makes impractical to use of these algorithms. The proposed verification criterion tries to eliminate blocks that are detected erroneously by authentication algorithm. The criterion uses neighboring concept based on 8-conectivity and it is evaluated using three image authentication algorithms based on semi-fragile watermarking technique. The false positive and false negative error probabilities for these three algorithms with the proposed criterion were calculated, when watermarked images were received content altered attack, such as photomontage, and content preserved attacks, such as JPEG compression and noise contamination. The experimental results show favorable performance of the proposed criterion, and the comparison results of three authentication algorithms suggest advantage and disadvantage of these three algorithms.