Skip to main content
Log in

Methods for controlling the authenticity of textual information transfer on the basis of statistical and structural redundancy

  • Regular Paper
  • Published:
International Journal of Automation and Computing Aims and scope Submit manuscript

Abstract

In this paper, the problem of increasing information transfer authenticity is formulated. And to reach a decision, the control methods and algorithms based on the use of statistical and structural information redundancy are presented. It is assumed that the controllable information is submitted as the text element images and it contains redundancy, caused by statistical relations and non-uniformity probability distribution of the transmitted data. The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information. The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms. The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages. The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes, labour input and cost of realization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. E. Charniak. Statistical parsing with a context-free grammar and word statistics. In Proceedings of the 14th National Conference on Artificial Intelligence, ACM, Menlo Park, USA, pp. 598–603, 1997.

    Google Scholar 

  2. P. F. Brown, V. D. Pietra, P. V. DeSouza, J. C. Lai, R. L. Mercer. Class-based n-gram models of natural language. Computational Linguistics, vol. 18, no. 4, pp. 467–479, 1992.

    Google Scholar 

  3. R. J. Duncan, V. Mantha, Y. Wu, J. Zhao. Implementation and analysis of speech recognition front-ends. In Proceedings of IEEE Southeastcon, IEEE, Lexington, USA, pp. 32–35, 1999.

    Google Scholar 

  4. I. I. Jumanov, A. R. Akhatov. Improvement of text information processing quality in documents processing systems. In Proceedings of the 2nd IEEE/IFIP International Conference in Central Asia on Internet, IEEE, Tashkent, Uzbekistan, pp. 1–5, 2006.

    Chapter  Google Scholar 

  5. I. I. Jumanov, A. R. Akhatov, O. I. Djumanov. An effective quality control of textual information on the basis of statistical redundancy in distributed mobile IT systems and e-applications. In Proceedings of the 3rd IEEE/IFIP International Conference in Central Asia on Internet, Tashkent, Uzbekistan, pp. 1–5, 2007.

  6. I. I. Jumanov, A. R. Akhatov, Z. A. Karshiyev, M. M. Kurbanov. Use of N-gram statistics for checking of the texts transfer quality in intellectual information systems. In Proceedings of the 15th World Conference on Intelligent Systems for Industrial Automation, Tashkent, Uzbekistan, pp. 153–159, 2008.

  7. M. Degermark, B. Nordgren, S. Pink. IP Header Compression, RFC 2507, 1999. [Online], Available: http://www.ietf.org/rfc/rfc2507.txt, February 15, 2012.

  8. F. A. Tobagi. Multi-access protocols in packet communications systems. IEEE Transactions on Communications, vol. 28, no. 4, pp. 468–488, 1980.

    Article  Google Scholar 

  9. S. Casner, V. Jacobson. Compressing IP/UDP/RTP Headers for Low-speed Serial Links, RFC 2508, 1999. [Online], Available: http://www.ietf.org/rfc/rfc2508.txt, February 15, 2012.

  10. M. Wahl. A Summary of the X.500(96) User Schema for Use with LDAPv3, RFC 2256, 1997. [Online], Available: http://www.ipa.go.jp/security/rfc/RFC2256EN.html, February 15, 2012.

  11. S. Blake-Wilson, M. Nystrom, D. Hopwood, J. Mikkelsen, T. Wright. Transport Layer Security (TLS) Extensions, RFC 3546, 2003. [Online], Available: http://www.ietf.org/rfc/rfc3546.txt, February 15, 2012.

  12. I. I. Jumanov, A. R. Akhatov, Z. A. Karshiyev, M. M. Kurbanov. Definition of transfer efficiency parameters of IPpackets headings for the reliability control. In Proceedings of the 9th International Conference on Electronics, Information and Communication, Tashkent, Uzbekistan, pp. 115–119, 2008.

  13. L. Yang, X. P. Guan, C. N. Long, X. Y. Luo. Feedback stabilization over wireless network using adaptive coded modulation. International Journal of Automation and Computing, vol. 5, no. 4, pp. 381–388, 2008.

    Article  Google Scholar 

  14. X. M. Tang, J. S. Yu. Feedback scheduling of model-based networked control systems with flexible workload. International Journal of Automation and Computing, vol. 5, no. 4, pp. 389–394, 2008.

    Article  Google Scholar 

  15. C. Bormann, C. Burmeister, M. Degermark, H. Fukushima, H. Hannu, L. E. Jonsson, R. Hakenberg, T. Koren, K. Le, Z. Liu, A. Martensson, A. Miyazaki, K. Svanbro, T. Wiebke, T. Yoshimura, H. Zheng. Robust Header Compression, RFC 3095, 2001. [Online], Available: http://www.ietf.org/rfc/rfc3095.txt, February 15, 2012.

  16. J. Cox, M. Miller, A. McKellips. Watermarking as communications with side information. Proceedings of the IEEE, vol. 87, no. 7, pp. 1127–1141, 1999.

    Article  Google Scholar 

  17. R. J. Anderson. Stretching the limits of steganography. In Proceedings of the 1st International Workshop on Information Hiding, ACM, London, UK, vol. 1174, pp. 39–48, 1996.

    Chapter  Google Scholar 

  18. I. Pitas. A method for signature casting on digital images. In Proceedings of International Conference on Image Processing, IEEE, Lausanne, Switzerland, vol. 3, pp. 215–218, 1996.

    Google Scholar 

  19. B. Chen, G. W. Wornell. An information-theoretic approach to the design of robust digital watermarking systems. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing, IEEE, Phoenix, USA, vol. 4, pp. 2061–2064, 1999.

    Google Scholar 

  20. I. I. Jumanov, A. R. Akhatov. Estimation of reliability for the system of mistakes dynamic control at transfer and processing of the text information. In Proceedings of International School and Conference on Foliations, Dynamical Systems, Singularity Theory and Perverse Sheaves, Uzbekistan, Samarkand, pp. 80–85, 2010.

  21. H. Al-Bahadili, S. M. Hussain. A bit-level text compression scheme based on the ACWalgorithm. International Journal of Automation and Computing, vol. 7, no. 1, pp. 123–131, 2010.

    Article  Google Scholar 

  22. Q. C. Wang, Y. H. Gong, C. H. Yang, C. H. Li. Robust object tracking under appearance change conditions. International Journal of Automation and Computing, vol. 7, no. 1, pp. 31–38, 2010.

    Article  Google Scholar 

  23. S. E. I. Baba, L. Z. Krikor, T. Arif, Z. Shaaban. Watermarking of digital images in frequency domain. International Journal of Automation and Computing, vol. 7, no. 1, pp. 17–22, 2010.

    Article  Google Scholar 

  24. B. Y. Ryabko, V. A. Monarev. Using information theory approach to randomness testing. Journal of Statistical Planning and Inference, vol. 133, no. 1, pp. 95–110, 2005.

    Article  MathSciNet  MATH  Google Scholar 

  25. B. Ryabko, J. Astola. Universal coding of function spaces as a model for signal compression. In Proceedings of Data Compression Conference, IEEE, Snowbird, Utah, pp. 382–388, 2004.

    Google Scholar 

  26. K. V. Vorontsov. Combinatorial probability and the tightness of generalization bounds. Pattern Recognition and Image Analysis, vol. 18, no. 2, pp. 243–259, 2008.

    Article  Google Scholar 

  27. A. R. Akhatov. Technique for definition N-gram mistakes estimations in the automated systems of information processing. In Proceedings of the 15th World Conference on Intelligent Systems for Industrial Automation, Tashkent, Uzbekistan, pp. 146–153, 2008.

  28. J. Sun, Y. J. Xing. An effective image retrieval mechanism using family-based spatial consistency filtration with object region. International Journal of Automation and Computing, vol. 7, no. 1, pp. 23–30, 2010.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akmal R. Akhatov.

Additional information

Akmal R. Akhatov received his B. Sc. degree in applied mathematics from the Samarkand State University, Uzbekistan in 1997, and the Ph.D. degree at Research Institute of Cybernetics, Academy of Sciences of Uzbekistan in 2004. In 2004–2006, he was the senior teacher at Department of the Information Technologies, Samarkand State University, Uzbekistan. Currently, he is the senior lecturer in the Department of Information Technologies at Samarkand State University, Uzbekistan. He has published about 160 research papers in proceedings of international conferences/workshops and archival journals, and also about 15 certificates about official registration of software in State Patent Department Republic of Uzbekistan.

His research interests include information technologies, automation managing systems, and increasing of the information reliability in telecommunication systems.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Akhatov, A.R. Methods for controlling the authenticity of textual information transfer on the basis of statistical and structural redundancy. Int. J. Autom. Comput. 9, 518–529 (2012). https://doi.org/10.1007/s11633-012-0675-8

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11633-012-0675-8

Keywords

Navigation