Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method
This paper analyzes the performance of the image authentication method based on robust hashing proposed by J. Fridrich and M. Goljan . In this method, both the embedder and the detector generate the watermark from a perceptual digest of the image. Therefore, an accurate performance analysis requires...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2009-09, Vol.4 (3), p.570-577 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 577 |
---|---|
container_issue | 3 |
container_start_page | 570 |
container_title | IEEE transactions on information forensics and security |
container_volume | 4 |
creator | Dominguez-Conde, G. Comesana, P. Perez-Gonzalez, F. |
description | This paper analyzes the performance of the image authentication method based on robust hashing proposed by J. Fridrich and M. Goljan . In this method, both the embedder and the detector generate the watermark from a perceptual digest of the image. Therefore, an accurate performance analysis requires assessing the relation between noise and hash bit errors. Our approach first derives the probability of hash bit error due to watermark embedding and/or the attack, and then uses such probability to derive the probabilities of false positive and false negative. |
doi_str_mv | 10.1109/TIFS.2009.2026463 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_5159467</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5159467</ieee_id><sourcerecordid>2293773301</sourcerecordid><originalsourceid>FETCH-LOGICAL-c222t-705c2f35b860d2c8542f95f529a6f88ee23a2d700f03a676771798353fe0b0213</originalsourceid><addsrcrecordid>eNo9kE1PAjEQhhujiYj-AONl432xH9uPPRICSILRBDw3pTuVkmWL7XLg37MbCJeZOTzvZOZB6JXgESG4_FgvZqsRxbjsChWFYHdoQDgXucCU3N9mwh7RU0o7jIuCCDVAyx-ILsS9aSxk48bUp-RTFlw2i76K3m7zeah3pslWULt8ut9AVfnmLxsf2y00rbem9aHJvqDdhuoZPThTJ3i59iH6nU3Xk898-T1fTMbL3FJK21xibqljfKMErqhVvKCu5I7T0ginFABlhlYSY4eZEVJISWSpGGcO8KZ7hw3R-2XvIYb_I6RW78IxdscnrbikrBPQQ-QC2RhSiuD0Ifq9iSdNsO6d6d6Z7p3pq7Mu83bJeAC48ZzwshCSnQESJ2aO</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>857232641</pqid></control><display><type>article</type><title>Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method</title><source>IEEE Electronic Library (IEL)</source><creator>Dominguez-Conde, G. ; Comesana, P. ; Perez-Gonzalez, F.</creator><creatorcontrib>Dominguez-Conde, G. ; Comesana, P. ; Perez-Gonzalez, F.</creatorcontrib><description>This paper analyzes the performance of the image authentication method based on robust hashing proposed by J. Fridrich and M. Goljan . In this method, both the embedder and the detector generate the watermark from a perceptual digest of the image. Therefore, an accurate performance analysis requires assessing the relation between noise and hash bit errors. Our approach first derives the probability of hash bit error due to watermark embedding and/or the attack, and then uses such probability to derive the probabilities of false positive and false negative.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2009.2026463</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authentication ; Content-based authentication ; Cryptography ; Detectors ; Discrete cosine transforms ; Forgery ; Image analysis ; Noise robustness ; Performance analysis ; Protection ; robust hash ; Watermarking</subject><ispartof>IEEE transactions on information forensics and security, 2009-09, Vol.4 (3), p.570-577</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c222t-705c2f35b860d2c8542f95f529a6f88ee23a2d700f03a676771798353fe0b0213</citedby><cites>FETCH-LOGICAL-c222t-705c2f35b860d2c8542f95f529a6f88ee23a2d700f03a676771798353fe0b0213</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5159467$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5159467$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dominguez-Conde, G.</creatorcontrib><creatorcontrib>Comesana, P.</creatorcontrib><creatorcontrib>Perez-Gonzalez, F.</creatorcontrib><title>Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>This paper analyzes the performance of the image authentication method based on robust hashing proposed by J. Fridrich and M. Goljan . In this method, both the embedder and the detector generate the watermark from a perceptual digest of the image. Therefore, an accurate performance analysis requires assessing the relation between noise and hash bit errors. Our approach first derives the probability of hash bit error due to watermark embedding and/or the attack, and then uses such probability to derive the probabilities of false positive and false negative.</description><subject>Authentication</subject><subject>Content-based authentication</subject><subject>Cryptography</subject><subject>Detectors</subject><subject>Discrete cosine transforms</subject><subject>Forgery</subject><subject>Image analysis</subject><subject>Noise robustness</subject><subject>Performance analysis</subject><subject>Protection</subject><subject>robust hash</subject><subject>Watermarking</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1PAjEQhhujiYj-AONl432xH9uPPRICSILRBDw3pTuVkmWL7XLg37MbCJeZOTzvZOZB6JXgESG4_FgvZqsRxbjsChWFYHdoQDgXucCU3N9mwh7RU0o7jIuCCDVAyx-ILsS9aSxk48bUp-RTFlw2i76K3m7zeah3pslWULt8ut9AVfnmLxsf2y00rbem9aHJvqDdhuoZPThTJ3i59iH6nU3Xk898-T1fTMbL3FJK21xibqljfKMErqhVvKCu5I7T0ginFABlhlYSY4eZEVJISWSpGGcO8KZ7hw3R-2XvIYb_I6RW78IxdscnrbikrBPQQ-QC2RhSiuD0Ifq9iSdNsO6d6d6Z7p3pq7Mu83bJeAC48ZzwshCSnQESJ2aO</recordid><startdate>200909</startdate><enddate>200909</enddate><creator>Dominguez-Conde, G.</creator><creator>Comesana, P.</creator><creator>Perez-Gonzalez, F.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>200909</creationdate><title>Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method</title><author>Dominguez-Conde, G. ; Comesana, P. ; Perez-Gonzalez, F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c222t-705c2f35b860d2c8542f95f529a6f88ee23a2d700f03a676771798353fe0b0213</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Authentication</topic><topic>Content-based authentication</topic><topic>Cryptography</topic><topic>Detectors</topic><topic>Discrete cosine transforms</topic><topic>Forgery</topic><topic>Image analysis</topic><topic>Noise robustness</topic><topic>Performance analysis</topic><topic>Protection</topic><topic>robust hash</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dominguez-Conde, G.</creatorcontrib><creatorcontrib>Comesana, P.</creatorcontrib><creatorcontrib>Perez-Gonzalez, F.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dominguez-Conde, G.</au><au>Comesana, P.</au><au>Perez-Gonzalez, F.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2009-09</date><risdate>2009</risdate><volume>4</volume><issue>3</issue><spage>570</spage><epage>577</epage><pages>570-577</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>This paper analyzes the performance of the image authentication method based on robust hashing proposed by J. Fridrich and M. Goljan . In this method, both the embedder and the detector generate the watermark from a perceptual digest of the image. Therefore, an accurate performance analysis requires assessing the relation between noise and hash bit errors. Our approach first derives the probability of hash bit error due to watermark embedding and/or the attack, and then uses such probability to derive the probabilities of false positive and false negative.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2009.2026463</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2009-09, Vol.4 (3), p.570-577 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_ieee_primary_5159467 |
source | IEEE Electronic Library (IEL) |
subjects | Authentication Content-based authentication Cryptography Detectors Discrete cosine transforms Forgery Image analysis Noise robustness Performance analysis Protection robust hash Watermarking |
title | Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T17%3A56%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Performance%20Analysis%20of%20Fridrich-Goljan%20Self-Embedding%20Authentication%20Method&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Dominguez-Conde,%20G.&rft.date=2009-09&rft.volume=4&rft.issue=3&rft.spage=570&rft.epage=577&rft.pages=570-577&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2009.2026463&rft_dat=%3Cproquest_RIE%3E2293773301%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=857232641&rft_id=info:pmid/&rft_ieee_id=5159467&rfr_iscdi=true |