Video Authentication Using Watermark and Digital Signature-A Study

被引:3
作者
Sowmya, K. N. [1 ]
Chennamma, H. R. [2 ]
机构
[1] JSS Acad Tech Educ, Bangalore, Karnataka, India
[2] Sri Jayachamarajendra Coll Engn, Mysuru, Karnataka, India
来源
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016 | 2017年 / 507卷
关键词
Video forgery; Video watermarking; Video tampering; Blind detection; Digital signature; Video authentication; Active approach;
D O I
10.1007/978-981-10-2471-9_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Widespread and easily available tools have become common for video synthesis and maneuvring in the digital era. It is therefore necessary, imperative and difficult as well to ensure the authenticity of video information. Authenticity and trustworthiness of the video is of paramount importance in a variety of areas like court of law, surveillance systems, journalism, advertisement, movie industry and medical world. Any malicious alteration or modification could affect the decisions taken based on these videos. Video authentication and tampering detection techniques due to intentional changes which are visible or invisible in a video are discussed in this paper.
引用
收藏
页码:53 / 64
页数:12
相关论文
共 35 条
  • [1] [Anonymous], 2001, P 2001 WORKSHOP MULT
  • [2] Chaotic watermarking for video authentication in surveillance applications
    Chen, Siyue
    Leung, Henry
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (05) : 704 - 709
  • [3] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [4] Dittmann Jana, 1999, MULT COMP SYST 1999, V2
  • [5] DUTTA T, 2013, NAT C COMM NCC, P1
  • [6] Tampering Detection in Compressed Digital Video Using Watermarking
    Fallahpour, Mehdi
    Shirmohammadi, Shervin
    Semsarzadeh, Mehdi
    Zhao, Jiying
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2014, 63 (05) : 1057 - 1072
  • [7] Analysis and design of secure watermark-based authentication systems
    Fei, Chuhong
    Kundur, Deepa
    Kwong, Raymond H.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) : 43 - 55
  • [8] Feng Gui, 2013, ANT SEC ID ASID 2013, P1
  • [9] Fridrich J, 2000, IEEE IMAGE PROC, P446, DOI 10.1109/ICIP.2000.900991
  • [10] Hartung F, 1997, INT CONF ACOUST SPEE, P2621, DOI 10.1109/ICASSP.1997.595326