Abo Bibliothek: Guest
Digitales Portal Digitale Bibliothek eBooks Zeitschriften Referenzen und Berichte Forschungssammlungen
Telecommunications and Radio Engineering
SJR: 0.202 SNIP: 0.2 CiteScore™: 0.23

ISSN Druckformat: 0040-2508
ISSN Online: 1943-6009

Volumes:
Volumen 79, 2020 Volumen 78, 2019 Volumen 77, 2018 Volumen 76, 2017 Volumen 75, 2016 Volumen 74, 2015 Volumen 73, 2014 Volumen 72, 2013 Volumen 71, 2012 Volumen 70, 2011 Volumen 69, 2010 Volumen 68, 2009 Volumen 67, 2008 Volumen 66, 2007 Volumen 65, 2006 Volumen 64, 2005 Volumen 63, 2005 Volumen 62, 2004 Volumen 61, 2004 Volumen 60, 2003 Volumen 59, 2003 Volumen 58, 2002 Volumen 57, 2002 Volumen 56, 2001 Volumen 55, 2001 Volumen 54, 2000 Volumen 53, 1999 Volumen 52, 1998 Volumen 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v67.i19.80
pages 1777-1790

A Novel Verification Scheme for Watermarking Based Image Content Authentication Systems

C. Cruz-Ramos
National Polytechnic Institute of Mexico City
R. Reyes-Reyes
National Polytechnic Institute of Mexico City
J. Mendoza-Noriega
National Polytechnic Institute of Mexico City
Mariko Nakano-Miyatake
National Polytechnic Institute, IPN, Mexico City
Hector Manuel Perez-Meana
National Polytechnic Institute of Mexico

ABSTRAKT

In this paper, a verification criterion to reduce false positive and false negative error probability for image content authentication systems is proposed. Many image content authentication algorithms detect content altered region of images, but generally, both false positive and false negative error are considerably high and it makes impractical to use of these algorithms. The proposed verification criterion tries to eliminate blocks that are detected erroneously by authentication algorithm. The criterion uses neighboring concept based on 8-conectivity and it is evaluated using three image authentication algorithms based on semi-fragile watermarking technique. The false positive and false negative error probabilities for these three algorithms with the proposed criterion were calculated, when watermarked images were received content altered attack, such as photomontage, and content preserved attacks, such as JPEG compression and noise contamination. The experimental results show favorable performance of the proposed criterion, and the comparison results of three authentication algorithms suggest advantage and disadvantage of these three algorithms.