Video Authentication- An Overview
Citations
13 citations
Cites background from "Video Authentication- An Overview"
...Trustworthiness of such videos has to be ensured before presenting them as an evidences otherwise it may defame the position of the people [3-6]....
[...]
9 citations
7 citations
Cites background from "Video Authentication- An Overview"
...So, based on regional property video sequences, video tampering attacks can be broadly classified in three categories: spatial tampering attacks, temporal tampering attacks and spatio-temporal attacks [2]....
[...]
7 citations
Cites methods from "Video Authentication- An Overview"
...Authentication method has two major techniques: digital signature and watermarking [3]....
[...]
7 citations
Cites background or methods from "Video Authentication- An Overview"
...Digital Watermarking is one such technique that can be useful to resolve ownership problem of original content (Upadhyay & Singh, 2011)....
[...]
...Zhang and Ho (2006) proposed a new complete fragile watermarking scheme that uses the tree-structured motion compensation, motion estimation and Lagrangian optimisation of H....
[...]
...In addition to the above and according to Fridrich (1999) and Upadhyay and Singh (2011), the DC and the two first AC coefficients are more stable than the other coefficients in the image manipulation....
[...]
References
40,147 citations
14,980 citations
1,186 citations
481 citations