Authentication and Digital Video Tampering Detection Using Watermarking

被引:0
作者
Thenmozhi, R. [1 ]
Balachandar, K. [1 ]
Cathrine, Shobana [1 ]
Swathikha, S. [1 ]
Devi, G. Ranjana [1 ]
Saravanan, R. [1 ]
机构
[1] SMVEC, Dept CSE, Pondicherry, India
来源
ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015) | 2015年
关键词
Authentication; QDCT; watermarking; Quantization Parameter; tampering detection; H.264/AVC; SCHEME; FRAMEWORK; DESIGN; SECURE;
D O I
10.1145/2743065.2743098
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Image processing is a method of analyzing and manipulating the digitized image to reduce noise and to improve its quality. It usually refers to digital image processing, but image processing can also be done for optical and analog types. The input is an image which can be either a photograph or video frame while the output can either be an image or a set of characteristics of an image.The analysis of an image requires techniques that can identify colors, shades etc. we present a method that focuses totally upon tampering detection and to provide authentication when a video is transmitted from one user to another. It also concentrates on reducing noise distortion. This is made possible by means of using modified QDCT and by embedding watermark signals.
引用
收藏
页数:5
相关论文
共 36 条
[1]  
Amudhavel J., 2010, Proceedings of 2010 International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2010), P252, DOI 10.1109/ARTCom.2010.97
[2]  
[Anonymous], 2005, P IEEE C INSTR MEAS
[3]   Watermarking of MPEG-4 video objects [J].
Barni, M ;
Bartolini, F ;
Checcacci, N .
IEEE TRANSACTIONS ON MULTIMEDIA, 2005, 7 (01) :23-32
[4]   Image authentication techniques for surveillance applications [J].
Bartolini, F ;
Tefas, A ;
Barni, M ;
Pitas, I .
PROCEEDINGS OF THE IEEE, 2001, 89 (10) :1403-1418
[5]  
Biswas S., ADAPTIVE COMPRESSED
[6]  
Biswas SN, 2012, IEEE IMTC P, P225
[7]   Chaotic watermarking for video authentication in surveillance applications [J].
Chen, Siyue ;
Leung, Henry .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (05) :704-709
[8]  
Chen Xiaoling, 2012, Proceedings of the 2012 Second International Conference on Intelligent System Design and Engineering Application (ISDEA), P134, DOI 10.1109/ISdea.2012.413
[9]   A new approach in development of distributed framework for automated software testing using agents [J].
Dhavachelvan, P. ;
Uma, G. V. ;
Venkatachalapathy, V. S. K. .
KNOWLEDGE-BASED SYSTEMS, 2006, 19 (04) :235-247
[10]   Multi-agent-based integrated framework for intra-class testing of object-oriented software [J].
Dhavachelvan, P ;
Uma, GV .
APPLIED SOFT COMPUTING, 2005, 5 (02) :205-222