Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method

This paper analyzes the performance of the image authentication method based on robust hashing proposed by J. Fridrich and M. Goljan . In this method, both the embedder and the detector generate the watermark from a perceptual digest of the image. Therefore, an accurate performance analysis requires...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2009-09, Vol.4 (3), p.570-577
Hauptverfasser: Dominguez-Conde, G., Comesana, P., Perez-Gonzalez, F.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 577
container_issue 3
container_start_page 570
container_title IEEE transactions on information forensics and security
container_volume 4
creator Dominguez-Conde, G.
Comesana, P.
Perez-Gonzalez, F.
description This paper analyzes the performance of the image authentication method based on robust hashing proposed by J. Fridrich and M. Goljan . In this method, both the embedder and the detector generate the watermark from a perceptual digest of the image. Therefore, an accurate performance analysis requires assessing the relation between noise and hash bit errors. Our approach first derives the probability of hash bit error due to watermark embedding and/or the attack, and then uses such probability to derive the probabilities of false positive and false negative.
doi_str_mv 10.1109/TIFS.2009.2026463
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_5159467</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5159467</ieee_id><sourcerecordid>2293773301</sourcerecordid><originalsourceid>FETCH-LOGICAL-c222t-705c2f35b860d2c8542f95f529a6f88ee23a2d700f03a676771798353fe0b0213</originalsourceid><addsrcrecordid>eNo9kE1PAjEQhhujiYj-AONl432xH9uPPRICSILRBDw3pTuVkmWL7XLg37MbCJeZOTzvZOZB6JXgESG4_FgvZqsRxbjsChWFYHdoQDgXucCU3N9mwh7RU0o7jIuCCDVAyx-ILsS9aSxk48bUp-RTFlw2i76K3m7zeah3pslWULt8ut9AVfnmLxsf2y00rbem9aHJvqDdhuoZPThTJ3i59iH6nU3Xk898-T1fTMbL3FJK21xibqljfKMErqhVvKCu5I7T0ginFABlhlYSY4eZEVJISWSpGGcO8KZ7hw3R-2XvIYb_I6RW78IxdscnrbikrBPQQ-QC2RhSiuD0Ifq9iSdNsO6d6d6Z7p3pq7Mu83bJeAC48ZzwshCSnQESJ2aO</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>857232641</pqid></control><display><type>article</type><title>Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method</title><source>IEEE Electronic Library (IEL)</source><creator>Dominguez-Conde, G. ; Comesana, P. ; Perez-Gonzalez, F.</creator><creatorcontrib>Dominguez-Conde, G. ; Comesana, P. ; Perez-Gonzalez, F.</creatorcontrib><description>This paper analyzes the performance of the image authentication method based on robust hashing proposed by J. Fridrich and M. Goljan . In this method, both the embedder and the detector generate the watermark from a perceptual digest of the image. Therefore, an accurate performance analysis requires assessing the relation between noise and hash bit errors. Our approach first derives the probability of hash bit error due to watermark embedding and/or the attack, and then uses such probability to derive the probabilities of false positive and false negative.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2009.2026463</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authentication ; Content-based authentication ; Cryptography ; Detectors ; Discrete cosine transforms ; Forgery ; Image analysis ; Noise robustness ; Performance analysis ; Protection ; robust hash ; Watermarking</subject><ispartof>IEEE transactions on information forensics and security, 2009-09, Vol.4 (3), p.570-577</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c222t-705c2f35b860d2c8542f95f529a6f88ee23a2d700f03a676771798353fe0b0213</citedby><cites>FETCH-LOGICAL-c222t-705c2f35b860d2c8542f95f529a6f88ee23a2d700f03a676771798353fe0b0213</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5159467$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5159467$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dominguez-Conde, G.</creatorcontrib><creatorcontrib>Comesana, P.</creatorcontrib><creatorcontrib>Perez-Gonzalez, F.</creatorcontrib><title>Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>This paper analyzes the performance of the image authentication method based on robust hashing proposed by J. Fridrich and M. Goljan . In this method, both the embedder and the detector generate the watermark from a perceptual digest of the image. Therefore, an accurate performance analysis requires assessing the relation between noise and hash bit errors. Our approach first derives the probability of hash bit error due to watermark embedding and/or the attack, and then uses such probability to derive the probabilities of false positive and false negative.</description><subject>Authentication</subject><subject>Content-based authentication</subject><subject>Cryptography</subject><subject>Detectors</subject><subject>Discrete cosine transforms</subject><subject>Forgery</subject><subject>Image analysis</subject><subject>Noise robustness</subject><subject>Performance analysis</subject><subject>Protection</subject><subject>robust hash</subject><subject>Watermarking</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1PAjEQhhujiYj-AONl432xH9uPPRICSILRBDw3pTuVkmWL7XLg37MbCJeZOTzvZOZB6JXgESG4_FgvZqsRxbjsChWFYHdoQDgXucCU3N9mwh7RU0o7jIuCCDVAyx-ILsS9aSxk48bUp-RTFlw2i76K3m7zeah3pslWULt8ut9AVfnmLxsf2y00rbem9aHJvqDdhuoZPThTJ3i59iH6nU3Xk898-T1fTMbL3FJK21xibqljfKMErqhVvKCu5I7T0ginFABlhlYSY4eZEVJISWSpGGcO8KZ7hw3R-2XvIYb_I6RW78IxdscnrbikrBPQQ-QC2RhSiuD0Ifq9iSdNsO6d6d6Z7p3pq7Mu83bJeAC48ZzwshCSnQESJ2aO</recordid><startdate>200909</startdate><enddate>200909</enddate><creator>Dominguez-Conde, G.</creator><creator>Comesana, P.</creator><creator>Perez-Gonzalez, F.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>200909</creationdate><title>Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method</title><author>Dominguez-Conde, G. ; Comesana, P. ; Perez-Gonzalez, F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c222t-705c2f35b860d2c8542f95f529a6f88ee23a2d700f03a676771798353fe0b0213</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Authentication</topic><topic>Content-based authentication</topic><topic>Cryptography</topic><topic>Detectors</topic><topic>Discrete cosine transforms</topic><topic>Forgery</topic><topic>Image analysis</topic><topic>Noise robustness</topic><topic>Performance analysis</topic><topic>Protection</topic><topic>robust hash</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dominguez-Conde, G.</creatorcontrib><creatorcontrib>Comesana, P.</creatorcontrib><creatorcontrib>Perez-Gonzalez, F.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dominguez-Conde, G.</au><au>Comesana, P.</au><au>Perez-Gonzalez, F.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2009-09</date><risdate>2009</risdate><volume>4</volume><issue>3</issue><spage>570</spage><epage>577</epage><pages>570-577</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>This paper analyzes the performance of the image authentication method based on robust hashing proposed by J. Fridrich and M. Goljan . In this method, both the embedder and the detector generate the watermark from a perceptual digest of the image. Therefore, an accurate performance analysis requires assessing the relation between noise and hash bit errors. Our approach first derives the probability of hash bit error due to watermark embedding and/or the attack, and then uses such probability to derive the probabilities of false positive and false negative.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2009.2026463</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2009-09, Vol.4 (3), p.570-577
issn 1556-6013
1556-6021
language eng
recordid cdi_ieee_primary_5159467
source IEEE Electronic Library (IEL)
subjects Authentication
Content-based authentication
Cryptography
Detectors
Discrete cosine transforms
Forgery
Image analysis
Noise robustness
Performance analysis
Protection
robust hash
Watermarking
title Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T17%3A56%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Performance%20Analysis%20of%20Fridrich-Goljan%20Self-Embedding%20Authentication%20Method&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Dominguez-Conde,%20G.&rft.date=2009-09&rft.volume=4&rft.issue=3&rft.spage=570&rft.epage=577&rft.pages=570-577&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2009.2026463&rft_dat=%3Cproquest_RIE%3E2293773301%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=857232641&rft_id=info:pmid/&rft_ieee_id=5159467&rfr_iscdi=true