Inscrição na biblioteca: Guest
Portal Digital Begell Biblioteca digital da Begell eBooks Diários Referências e Anais Coleções de pesquisa
Telecommunications and Radio Engineering
SJR: 0.203 SNIP: 0.44 CiteScore™: 1

ISSN Imprimir: 0040-2508
ISSN On-line: 1943-6009

Volume 79, 2020 Volume 78, 2019 Volume 77, 2018 Volume 76, 2017 Volume 75, 2016 Volume 74, 2015 Volume 73, 2014 Volume 72, 2013 Volume 71, 2012 Volume 70, 2011 Volume 69, 2010 Volume 68, 2009 Volume 67, 2008 Volume 66, 2007 Volume 65, 2006 Volume 64, 2005 Volume 63, 2005 Volume 62, 2004 Volume 61, 2004 Volume 60, 2003 Volume 59, 2003 Volume 58, 2002 Volume 57, 2002 Volume 56, 2001 Volume 55, 2001 Volume 54, 2000 Volume 53, 1999 Volume 52, 1998 Volume 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v67.i19.80
pages 1777-1790

A Novel Verification Scheme for Watermarking Based Image Content Authentication Systems

C. Cruz-Ramos
National Polytechnic Institute of Mexico City
R. Reyes-Reyes
National Polytechnic Institute of Mexico City
J. Mendoza-Noriega
National Polytechnic Institute of Mexico City
Mariko Nakano-Miyatake
National Polytechnic Institute, IPN, Mexico City
Hector Manuel Perez-Meana
National Polytechnic Institute of Mexico


In this paper, a verification criterion to reduce false positive and false negative error probability for image content authentication systems is proposed. Many image content authentication algorithms detect content altered region of images, but generally, both false positive and false negative error are considerably high and it makes impractical to use of these algorithms. The proposed verification criterion tries to eliminate blocks that are detected erroneously by authentication algorithm. The criterion uses neighboring concept based on 8-conectivity and it is evaluated using three image authentication algorithms based on semi-fragile watermarking technique. The false positive and false negative error probabilities for these three algorithms with the proposed criterion were calculated, when watermarked images were received content altered attack, such as photomontage, and content preserved attacks, such as JPEG compression and noise contamination. The experimental results show favorable performance of the proposed criterion, and the comparison results of three authentication algorithms suggest advantage and disadvantage of these three algorithms.

Articles with similar content:

Telecommunications and Radio Engineering, Vol.69, 2010, issue 19
Benoit Vozel, Kacem Chehdi, P. Ye. Eltsov, A. V. Popov, V. V. Lukin, S. K. Abramov
Real-Time Audio Watermarking
Telecommunications and Radio Engineering, Vol.65, 2006, issue 1-5
Mariko Nakano-Miyatake, Hector Manuel Perez-Meana, Jose Garcia-Hernandez
Invariant Estimation of Sound Speed
Journal of Automation and Information Sciences, Vol.32, 2000, issue 2
Alexander D. Polonskiy
Control Problems of a Manipulator
Journal of Automation and Information Sciences, Vol.30, 1998, issue 4-5
Vladimir B. Larin
Use of Inaccurate Programming Methods for Determining Rational Options of Construction of a Complex Information Analytical System

Telecommunications and Radio Engineering, Vol.68, 2009, issue 20
E. A. Lineva, A. N. Manukovskii, A. A. Trifonov