Доступ предоставлен для: Guest
Портал Begell Электронная Бибилиотека e-Книги Журналы Справочники и Сборники статей Коллекции
Telecommunications and Radio Engineering
SJR: 0.202 SNIP: 0.2 CiteScore™: 0.23

ISSN Печать: 0040-2508
ISSN Онлайн: 1943-6009

Выпуски:
Том 78, 2019 Том 77, 2018 Том 76, 2017 Том 75, 2016 Том 74, 2015 Том 73, 2014 Том 72, 2013 Том 71, 2012 Том 70, 2011 Том 69, 2010 Том 68, 2009 Том 67, 2008 Том 66, 2007 Том 65, 2006 Том 64, 2005 Том 63, 2005 Том 62, 2004 Том 61, 2004 Том 60, 2003 Том 59, 2003 Том 58, 2002 Том 57, 2002 Том 56, 2001 Том 55, 2001 Том 54, 2000 Том 53, 1999 Том 52, 1998 Том 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v67.i19.80
pages 1777-1790

A Novel Verification Scheme for Watermarking Based Image Content Authentication Systems

C. Cruz-Ramos
National Polytechnic Institute of Mexico City
R. Reyes-Reyes
National Polytechnic Institute of Mexico City
J. Mendoza-Noriega
National Polytechnic Institute of Mexico City
Mariko Nakano-Miyatake
National Polytechnic Institute, IPN, Mexico City
Hector Manuel Perez-Meana
National Polytechnic Institute of Mexico

Краткое описание

In this paper, a verification criterion to reduce false positive and false negative error probability for image content authentication systems is proposed. Many image content authentication algorithms detect content altered region of images, but generally, both false positive and false negative error are considerably high and it makes impractical to use of these algorithms. The proposed verification criterion tries to eliminate blocks that are detected erroneously by authentication algorithm. The criterion uses neighboring concept based on 8-conectivity and it is evaluated using three image authentication algorithms based on semi-fragile watermarking technique. The false positive and false negative error probabilities for these three algorithms with the proposed criterion were calculated, when watermarked images were received content altered attack, such as photomontage, and content preserved attacks, such as JPEG compression and noise contamination. The experimental results show favorable performance of the proposed criterion, and the comparison results of three authentication algorithms suggest advantage and disadvantage of these three algorithms.