scispace - formally typeset
Open Access

Video Authentication: Issues and Challenges

TLDR
The issues in the designing of a video authentication system include the classification of tampering attacks, levels of tampering attack and robustness, and the categorization of existing video authentication techniques with their shortcomings are presented.
Abstract
Video authentication aims to ensure the trustworthiness of the video by verifying the integrity and source of video data. It has gained much attention in the recent years. In this paper we present the issues in the designing of a video authentication system. These issues include the classification of tampering attacks, levels of tampering attack and robustness. Further we present the categorization of existing video authentication techniques with their shortcomings. Moreover we have also given the challenging scenarios in which the video authentication would be a critical task.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Development of a video tampering dataset for forensic investigation.

TL;DR: A comprehensive proposal to create a dataset composed of modified videos for forensic investigation, in order to standardize existing techniques for detecting video tampering, and develop and designing this new video library for usage in video forensics.
Proceedings ArticleDOI

Detection clone an object movement using an optical flow approach

TL;DR: A new detection method to detect a video copy-move forgery detection with a significant improvement in terms of its accuracy based on the optical flow inconsistencies that considers image motion for detection clone an object movement based on displacement paths is proposed.
Book ChapterDOI

A Tool to Support the Creation of Datasets of Tampered Videos

TL;DR: A new tool to support the users in creating datasets of tampered videos and some remarks about how to create forgeries difficult to be detected by an observer, to the naked eye are discussed.

Research on Zero-Knowledge Proof Protocol

Wang Huqing, +1 more
TL;DR: The systematic introduction to zero-knowledge proof protocol has important theoretical guidance and practical significance on attracting more scholars involved in the research as well as expanding application fields.
Book ChapterDOI

A Fragile Watermarking Scheme for Modification Type Characterization in 2D Vector Maps

TL;DR: A fragile watermarking scheme for the content authentication of 2D vector maps that can not only detect and locate data modifications, but also characterize modification types is proposed.
References
More filters
Book

The Nature of Statistical Learning Theory

TL;DR: Setting of the learning problem consistency of learning processes bounds on the rate of convergence ofLearning processes controlling the generalization ability of learning process constructing learning algorithms what is important in learning theory?
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

Image Features From Phase Congruency

Peter Kovesi
TL;DR: Videre: Journal of Computer Vision Research is a quarterly journal published electronically on the Internet by The MIT Press, Cambridge, Massachusetts, 02142 and prices subject to change without notice.
Journal Article

Oxford English Dictionary (2nd ed.)

John Price-Wilkin
- 03 Jan 1991 - 
Journal ArticleDOI

Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications

TL;DR: It is shown that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone, and existing techniques are attacked by providing counterfeit water marking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership.