ライブラリ登録: Guest
Begell Digital Portal Begellデジタルライブラリー 電子書籍 ジャーナル 参考文献と会報 リサーチ集
Telecommunications and Radio Engineering
SJR: 0.202 SNIP: 0.2 CiteScore™: 0.23

ISSN 印刷: 0040-2508
ISSN オンライン: 1943-6009

巻:
巻 78, 2019 巻 77, 2018 巻 76, 2017 巻 75, 2016 巻 74, 2015 巻 73, 2014 巻 72, 2013 巻 71, 2012 巻 70, 2011 巻 69, 2010 巻 68, 2009 巻 67, 2008 巻 66, 2007 巻 65, 2006 巻 64, 2005 巻 63, 2005 巻 62, 2004 巻 61, 2004 巻 60, 2003 巻 59, 2003 巻 58, 2002 巻 57, 2002 巻 56, 2001 巻 55, 2001 巻 54, 2000 巻 53, 1999 巻 52, 1998 巻 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v67.i19.80
pages 1777-1790

A Novel Verification Scheme for Watermarking Based Image Content Authentication Systems

C. Cruz-Ramos
National Polytechnic Institute of Mexico City
R. Reyes-Reyes
National Polytechnic Institute of Mexico City
J. Mendoza-Noriega
National Polytechnic Institute of Mexico City
Mariko Nakano-Miyatake
National Polytechnic Institute, IPN, Mexico City
Hector Manuel Perez-Meana
National Polytechnic Institute of Mexico

要約

In this paper, a verification criterion to reduce false positive and false negative error probability for image content authentication systems is proposed. Many image content authentication algorithms detect content altered region of images, but generally, both false positive and false negative error are considerably high and it makes impractical to use of these algorithms. The proposed verification criterion tries to eliminate blocks that are detected erroneously by authentication algorithm. The criterion uses neighboring concept based on 8-conectivity and it is evaluated using three image authentication algorithms based on semi-fragile watermarking technique. The false positive and false negative error probabilities for these three algorithms with the proposed criterion were calculated, when watermarked images were received content altered attack, such as photomontage, and content preserved attacks, such as JPEG compression and noise contamination. The experimental results show favorable performance of the proposed criterion, and the comparison results of three authentication algorithms suggest advantage and disadvantage of these three algorithms.


Articles with similar content:

CELLULAR NEURAL NETWORK IMAGE EDGE DETECTION BASED ON HYPERBOLIC TANGENT FUNCTION − FROM PHOTOGRAPHIC IMAGE TO FLOW VISUALIZATION
Journal of Flow Visualization and Image Processing, Vol.22, 2015, issue 1-3
Xianhong Zhang , Chunrui Zhang
The Algorithm of Fractal Compression of Images
Telecommunications and Radio Engineering, Vol.62, 2004, issue 1-6
Yu. V. Martyshevskii
EVALUATION OF THE RAINBOW VOLUMIC VELOCIMETRY (RVV) PROCESS BY SYNTHETIC IMAGES
Journal of Flow Visualization and Image Processing, Vol.14, 2007, issue 1
C. Cudel, Jean-Pierre Prenel, R. Malfara, Yannick Bailly
MAIN DIRECTIONS OF IMPROVEMENT OF ACOUSTIC RECONNAISSANCE EQUIPMENT
Telecommunications and Radio Engineering, Vol.77, 2018, issue 2
A. N. Oleynikov, A. V. Borodavka
3D Fourier Coefficients on the Class of Differentiable Functions and Spline Interflatation
Journal of Automation and Information Sciences, Vol.44, 2012, issue 3
Oleg N. Lytvyn , Olesya P. Nechuiviter