TY - JOUR
T1 - A novel verification scheme for watermarking based image content authentication systems
AU - Cruz-Ramos, C.
AU - Reyes-Reyes, R.
AU - Mendoza-Noriega, J.
AU - Nakano-Miyatake, Mariko
AU - Perez-Meana, Hector Manuel
PY - 2008
Y1 - 2008
N2 - In this paper, a verification criterion to reduce false positive and false negative error probability for image content authentication systems is proposed. Many image content authentication algorithms detect content altered region of images, but generally, both false positive and false negative error are considerably high and it makes impractical to use of these algorithms. The proposed verification criterion tries to eliminate blocks that are detected erroneously by authentication algorithm. The criterion uses neighboring concept based on 8-conectivity and it is evaluated using three image authentication algorithms based on semi-fragile watermarking technique. The false positive and false negative error probabilities for these three algorithms with the proposed criterion were calculated, when watermarked images were received content altered attack, such as photomontage, and content preserved attacks, such as JPEG compression and noise contamination. The experimental results show favorable performance of the proposed criterion, and the comparison results of three authentication algorithms suggest advantage and disadvantage of these three algorithms.
AB - In this paper, a verification criterion to reduce false positive and false negative error probability for image content authentication systems is proposed. Many image content authentication algorithms detect content altered region of images, but generally, both false positive and false negative error are considerably high and it makes impractical to use of these algorithms. The proposed verification criterion tries to eliminate blocks that are detected erroneously by authentication algorithm. The criterion uses neighboring concept based on 8-conectivity and it is evaluated using three image authentication algorithms based on semi-fragile watermarking technique. The false positive and false negative error probabilities for these three algorithms with the proposed criterion were calculated, when watermarked images were received content altered attack, such as photomontage, and content preserved attacks, such as JPEG compression and noise contamination. The experimental results show favorable performance of the proposed criterion, and the comparison results of three authentication algorithms suggest advantage and disadvantage of these three algorithms.
UR - http://www.scopus.com/inward/record.url?scp=56849123866&partnerID=8YFLogxK
U2 - 10.1615/TelecomRadEng.v67.i19.80
DO - 10.1615/TelecomRadEng.v67.i19.80
M3 - Artículo
SN - 0040-2508
VL - 67
SP - 1777
EP - 1790
JO - Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika)
JF - Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika)
IS - 19
ER -