Detection, Estimation, and Modulation Theory: Radar-Sonar Signal Processing and Gaussian Signals in Noise
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Robust Bit Extraction from Images
ICMCS '99 Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems - Volume 02
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations
IEEE Transactions on Information Forensics and Security - Part 1
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Design and statistical analysis of a hash-aided image watermarking system
IEEE Transactions on Image Processing
On the modeling of DCT and subband image data for compression
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Perfomance analysis of the Fridrich-Goljan self-embedding authentication method
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Hi-index | 0.00 |
This paper analyzes the performance of the image authentication method based on robust hashing proposed by J. Fridrich and M. Goljan. In this method, both the embedder and the detector generate the watermark from a perceptual digest of the image. Therefore, an accurate performance analysis requires assessing the relation between noise and hash bit errors. Our approach first derives the probability of hash bit error due to watermark embedding and/or the attack, and then uses such probability to derive the probabilities of false positive and false negative.