Abstract
In this paper, the problem of increasing information transfer authenticity is formulated. And to reach a decision, the control methods and algorithms based on the use of statistical and structural information redundancy are presented. It is assumed that the controllable information is submitted as the text element images and it contains redundancy, caused by statistical relations and non-uniformity probability distribution of the transmitted data. The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information. The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms. The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages. The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes, labour input and cost of realization.
Similar content being viewed by others
References
E. Charniak. Statistical parsing with a context-free grammar and word statistics. In Proceedings of the 14th National Conference on Artificial Intelligence, ACM, Menlo Park, USA, pp. 598–603, 1997.
P. F. Brown, V. D. Pietra, P. V. DeSouza, J. C. Lai, R. L. Mercer. Class-based n-gram models of natural language. Computational Linguistics, vol. 18, no. 4, pp. 467–479, 1992.
R. J. Duncan, V. Mantha, Y. Wu, J. Zhao. Implementation and analysis of speech recognition front-ends. In Proceedings of IEEE Southeastcon, IEEE, Lexington, USA, pp. 32–35, 1999.
I. I. Jumanov, A. R. Akhatov. Improvement of text information processing quality in documents processing systems. In Proceedings of the 2nd IEEE/IFIP International Conference in Central Asia on Internet, IEEE, Tashkent, Uzbekistan, pp. 1–5, 2006.
I. I. Jumanov, A. R. Akhatov, O. I. Djumanov. An effective quality control of textual information on the basis of statistical redundancy in distributed mobile IT systems and e-applications. In Proceedings of the 3rd IEEE/IFIP International Conference in Central Asia on Internet, Tashkent, Uzbekistan, pp. 1–5, 2007.
I. I. Jumanov, A. R. Akhatov, Z. A. Karshiyev, M. M. Kurbanov. Use of N-gram statistics for checking of the texts transfer quality in intellectual information systems. In Proceedings of the 15th World Conference on Intelligent Systems for Industrial Automation, Tashkent, Uzbekistan, pp. 153–159, 2008.
M. Degermark, B. Nordgren, S. Pink. IP Header Compression, RFC 2507, 1999. [Online], Available: http://www.ietf.org/rfc/rfc2507.txt, February 15, 2012.
F. A. Tobagi. Multi-access protocols in packet communications systems. IEEE Transactions on Communications, vol. 28, no. 4, pp. 468–488, 1980.
S. Casner, V. Jacobson. Compressing IP/UDP/RTP Headers for Low-speed Serial Links, RFC 2508, 1999. [Online], Available: http://www.ietf.org/rfc/rfc2508.txt, February 15, 2012.
M. Wahl. A Summary of the X.500(96) User Schema for Use with LDAPv3, RFC 2256, 1997. [Online], Available: http://www.ipa.go.jp/security/rfc/RFC2256EN.html, February 15, 2012.
S. Blake-Wilson, M. Nystrom, D. Hopwood, J. Mikkelsen, T. Wright. Transport Layer Security (TLS) Extensions, RFC 3546, 2003. [Online], Available: http://www.ietf.org/rfc/rfc3546.txt, February 15, 2012.
I. I. Jumanov, A. R. Akhatov, Z. A. Karshiyev, M. M. Kurbanov. Definition of transfer efficiency parameters of IPpackets headings for the reliability control. In Proceedings of the 9th International Conference on Electronics, Information and Communication, Tashkent, Uzbekistan, pp. 115–119, 2008.
L. Yang, X. P. Guan, C. N. Long, X. Y. Luo. Feedback stabilization over wireless network using adaptive coded modulation. International Journal of Automation and Computing, vol. 5, no. 4, pp. 381–388, 2008.
X. M. Tang, J. S. Yu. Feedback scheduling of model-based networked control systems with flexible workload. International Journal of Automation and Computing, vol. 5, no. 4, pp. 389–394, 2008.
C. Bormann, C. Burmeister, M. Degermark, H. Fukushima, H. Hannu, L. E. Jonsson, R. Hakenberg, T. Koren, K. Le, Z. Liu, A. Martensson, A. Miyazaki, K. Svanbro, T. Wiebke, T. Yoshimura, H. Zheng. Robust Header Compression, RFC 3095, 2001. [Online], Available: http://www.ietf.org/rfc/rfc3095.txt, February 15, 2012.
J. Cox, M. Miller, A. McKellips. Watermarking as communications with side information. Proceedings of the IEEE, vol. 87, no. 7, pp. 1127–1141, 1999.
R. J. Anderson. Stretching the limits of steganography. In Proceedings of the 1st International Workshop on Information Hiding, ACM, London, UK, vol. 1174, pp. 39–48, 1996.
I. Pitas. A method for signature casting on digital images. In Proceedings of International Conference on Image Processing, IEEE, Lausanne, Switzerland, vol. 3, pp. 215–218, 1996.
B. Chen, G. W. Wornell. An information-theoretic approach to the design of robust digital watermarking systems. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing, IEEE, Phoenix, USA, vol. 4, pp. 2061–2064, 1999.
I. I. Jumanov, A. R. Akhatov. Estimation of reliability for the system of mistakes dynamic control at transfer and processing of the text information. In Proceedings of International School and Conference on Foliations, Dynamical Systems, Singularity Theory and Perverse Sheaves, Uzbekistan, Samarkand, pp. 80–85, 2010.
H. Al-Bahadili, S. M. Hussain. A bit-level text compression scheme based on the ACWalgorithm. International Journal of Automation and Computing, vol. 7, no. 1, pp. 123–131, 2010.
Q. C. Wang, Y. H. Gong, C. H. Yang, C. H. Li. Robust object tracking under appearance change conditions. International Journal of Automation and Computing, vol. 7, no. 1, pp. 31–38, 2010.
S. E. I. Baba, L. Z. Krikor, T. Arif, Z. Shaaban. Watermarking of digital images in frequency domain. International Journal of Automation and Computing, vol. 7, no. 1, pp. 17–22, 2010.
B. Y. Ryabko, V. A. Monarev. Using information theory approach to randomness testing. Journal of Statistical Planning and Inference, vol. 133, no. 1, pp. 95–110, 2005.
B. Ryabko, J. Astola. Universal coding of function spaces as a model for signal compression. In Proceedings of Data Compression Conference, IEEE, Snowbird, Utah, pp. 382–388, 2004.
K. V. Vorontsov. Combinatorial probability and the tightness of generalization bounds. Pattern Recognition and Image Analysis, vol. 18, no. 2, pp. 243–259, 2008.
A. R. Akhatov. Technique for definition N-gram mistakes estimations in the automated systems of information processing. In Proceedings of the 15th World Conference on Intelligent Systems for Industrial Automation, Tashkent, Uzbekistan, pp. 146–153, 2008.
J. Sun, Y. J. Xing. An effective image retrieval mechanism using family-based spatial consistency filtration with object region. International Journal of Automation and Computing, vol. 7, no. 1, pp. 23–30, 2010.
Author information
Authors and Affiliations
Corresponding author
Additional information
Akmal R. Akhatov received his B. Sc. degree in applied mathematics from the Samarkand State University, Uzbekistan in 1997, and the Ph.D. degree at Research Institute of Cybernetics, Academy of Sciences of Uzbekistan in 2004. In 2004–2006, he was the senior teacher at Department of the Information Technologies, Samarkand State University, Uzbekistan. Currently, he is the senior lecturer in the Department of Information Technologies at Samarkand State University, Uzbekistan. He has published about 160 research papers in proceedings of international conferences/workshops and archival journals, and also about 15 certificates about official registration of software in State Patent Department Republic of Uzbekistan.
His research interests include information technologies, automation managing systems, and increasing of the information reliability in telecommunication systems.
Rights and permissions
About this article
Cite this article
Akhatov, A.R. Methods for controlling the authenticity of textual information transfer on the basis of statistical and structural redundancy. Int. J. Autom. Comput. 9, 518–529 (2012). https://doi.org/10.1007/s11633-012-0675-8
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11633-012-0675-8