scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Video Authentication- An Overview

TL;DR: A brief survey on video authentication techniques with their classification is presented, broadly classified into four categories: digital signature based techniques, watermarkbased techniques, intelligent techniques and other techniques.
Abstract: With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are broadly classified into four categories: digital signature based techniques, watermark based techniques, intelligent techniques and other techniques. Furthermore we give the shortcomings of different categories of video authentication techniques in brief.

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI
01 Feb 2015
TL;DR: An algorithm that is divided in two parts: computing the repeated frames by processing the image pixels to produce a frame-by-frame motion energy time and computing the tampering attack and its location with the help of the Support Vector Machine helps to predict whether the given video has been tampered or not.
Abstract: The large amount of video content is being transmitted over internet and other channels. With the help of existing multimedia editing tools one can easily change the content of data which lead to lose the authenticity of the information. Thus, it becomes necessary to develop different methods by which the authenticity of the videos can be confirmed. In the past researchers have proposed several methods for authentication of videos. This paper presents an algorithm that is divided in two parts: computing the repeated frames by processing the image pixels to produce a frame-by-frame motion energy time and computing the tampering attack and its location with the help of the Support Vector Machine. This helps to predict whether the given video has been tampered or not.

13 citations


Cites background from "Video Authentication- An Overview"

  • ...Trustworthiness of such videos has to be ensured before presenting them as an evidences otherwise it may defame the position of the people [3-6]....

    [...]

Book ChapterDOI
01 Jan 2017
TL;DR: Video authentication and tampering detection techniques due to intentional changes which are visible or invisible in a video are discussed in this paper.
Abstract: Widespread and easily available tools have become common for video synthesis and maneuvring in the digital era. It is therefore necessary, imperative and difficult as well to ensure the authenticity of video information. Authenticity and trustworthiness of the video is of paramount importance in a variety of areas like court of law, surveillance systems, journalism, advertisement, movie industry and medical world. Any malicious alteration or modification could affect the decisions taken based on these videos. Video authentication and tampering detection techniques due to intentional changes which are visible or invisible in a video are discussed in this paper.

9 citations

Proceedings Article
11 Mar 2015
TL;DR: Classification of video authentication techniques and their fundamental features, developed in last few years for tempering detection in digital videos are presented.
Abstract: With the availability of advanced electronic gadgets like high-quality digital video camera, cell phone etc. there is an explosion of digital videos. When coupled with sophisticated digital video processing techniques there is a good increase in count and quality of tampered video. Video forensic is comparatively a new research domain which comes with many threats as well as many opportunities. This paper presents classification of video authentication techniques and their fundamental features, developed in last few years for tempering detection in digital videos.

7 citations


Cites background from "Video Authentication- An Overview"

  • ...So, based on regional property video sequences, video tampering attacks can be broadly classified in three categories: spatial tampering attacks, temporal tampering attacks and spatio-temporal attacks [2]....

    [...]

Proceedings ArticleDOI
22 Jul 2015
TL;DR: The signature based video authentication using the histogram of oriented gradient of the selected DCT coefficients found in the frequency domain of video frames is proposed, which depends on an optimal threshold that need to use a high threshold to reject all tampered videos.
Abstract: Digital video is fundamental of the surveillance system. However, it is easy to be modified by threats that may decrease drastically the trust of the surveillance system. In this paper, we introduce the video authentication that could protect the modification, eventually to increase the confidence and allowed the authenticated videos as evidences in law court. We propose the signature based video authentication using the histogram of oriented gradient of the selected DCT coefficients found in the frequency domain of video frames. The efficiency of our technique depends on an optimal threshold that need to use a high threshold to reject all tampered and improvement is required to allow compression.

7 citations


Cites methods from "Video Authentication- An Overview"

  • ...Authentication method has two major techniques: digital signature and watermarking [3]....

    [...]

Journal ArticleDOI
TL;DR: The proposed scheme achieves an accurate authentication technique with a high fragility and fidelity whilst maintaining the original bitrate and the perceptual quality and its ability to detect the tampered frames in case of spatial, temporal and colour manipulations is confirmed.
Abstract: Discrete cosine transform is exploited in this work to generate the authentication data that are treated as a fragile watermark. This watermark is embedded in the motion vectors. The advances in multimedia technologies and digital processing tools have brought with them new challenges for the source and content authentication. To ensure the integrity of the H.264/AVC video stream, we introduce an approach based on a content fragile video watermarking method using an independent authentication of each group of pictures (GOPs) within the video. This technique uses robust visual features extracted from the video pertaining to the set of selected macroblocs (MBs) which hold the best partition mode in a tree-structured motion compensation process. An additional security degree is offered by the proposed method through using a more secured keyed function HMAC-SHA-256 and randomly choosing candidates from already selected MBs. In here, the watermark detection and verification processes are blind, whereas...

7 citations


Cites background or methods from "Video Authentication- An Overview"

  • ...Digital Watermarking is one such technique that can be useful to resolve ownership problem of original content (Upadhyay & Singh, 2011)....

    [...]

  • ...Zhang and Ho (2006) proposed a new complete fragile watermarking scheme that uses the tree-structured motion compensation, motion estimation and Lagrangian optimisation of H....

    [...]

  • ...In addition to the above and according to Fridrich (1999) and Upadhyay and Singh (2011), the DC and the two first AC coefficients are more stable than the other coefficients in the image manipulation....

    [...]

References
More filters
Book
Vladimir Vapnik1
01 Jan 1995
TL;DR: Setting of the learning problem consistency of learning processes bounds on the rate of convergence ofLearning processes controlling the generalization ability of learning process constructing learning algorithms what is important in learning theory?
Abstract: Setting of the learning problem consistency of learning processes bounds on the rate of convergence of learning processes controlling the generalization ability of learning processes constructing learning algorithms what is important in learning theory?.

40,147 citations

Journal ArticleDOI
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Abstract: Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper suggests ways to solve these currently open problems. It also discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

14,980 citations

01 Jan 1995
TL;DR: Videre: Journal of Computer Vision Research is a quarterly journal published electronically on the Internet by The MIT Press, Cambridge, Massachusetts, 02142 and prices subject to change without notice.
Abstract: Videre: Journal of Computer Vision Research (ISSN 1089-2788) is a quarterly journal published electronically on the Internet by The MIT Press, Cambridge, Massachusetts, 02142. Subscriptions and address changes should be addressed to MIT Press Journals, Five Cambridge Center, Cambridge, MA 02142; phone: (617) 253-2889; fax: (617) 577-1545; e-mail: journals-orders@mit.edu. Subscription rates are: Individuals $30.00, Institutions $125.00. Canadians add additional 7% GST. Prices subject to change without notice.

1,186 citations

Journal Article

1,018 citations

Journal ArticleDOI
TL;DR: It is shown that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone, and existing techniques are attacked by providing counterfeit water marking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership.
Abstract: Digital watermarks have been proposed as a means for copyright protection of multimedia data. We address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image. In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking. We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques. We propose noninvertible watermarking schemes, and subsequently give examples of techniques that we believe to be nonquasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully reevaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and rethink the promises, applications and implications of such digital means of copyright protection.

481 citations