Open Access
Video Authentication: Issues and Challenges
Saurabh Upadhyay,Sanjay Singh +1 more
TLDR
The issues in the designing of a video authentication system include the classification of tampering attacks, levels of tampering attack and robustness, and the categorization of existing video authentication techniques with their shortcomings are presented.Abstract:
Video authentication aims to ensure the trustworthiness of the video by verifying the integrity and source of video data. It has gained much attention in the recent years. In this paper we present the issues in the designing of a video authentication system. These issues include the classification of tampering attacks, levels of tampering attack and robustness. Further we present the categorization of existing video authentication techniques with their shortcomings. Moreover we have also given the challenging scenarios in which the video authentication would be a critical task.read more
Citations
More filters
Journal ArticleDOI
Development of a video tampering dataset for forensic investigation.
TL;DR: A comprehensive proposal to create a dataset composed of modified videos for forensic investigation, in order to standardize existing techniques for detecting video tampering, and develop and designing this new video library for usage in video forensics.
Proceedings ArticleDOI
Detection clone an object movement using an optical flow approach
Omar Ismael Al-Sanjary,Ahmed A. Ahmed,Adam Amril Jaharadak,Musab A. M. Ali,Hewa Majeed Zangana +4 more
TL;DR: A new detection method to detect a video copy-move forgery detection with a significant improvement in terms of its accuracy based on the optical flow inconsistencies that considers image motion for detection clone an object movement based on displacement paths is proposed.
Book ChapterDOI
A Tool to Support the Creation of Datasets of Tampered Videos
TL;DR: A new tool to support the users in creating datasets of tampered videos and some remarks about how to create forgeries difficult to be detected by an observer, to the naked eye are discussed.
Research on Zero-Knowledge Proof Protocol
Wang Huqing,Sun Zhixin +1 more
TL;DR: The systematic introduction to zero-knowledge proof protocol has important theoretical guidance and practical significance on attracting more scholars involved in the research as well as expanding application fields.
Book ChapterDOI
A Fragile Watermarking Scheme for Modification Type Characterization in 2D Vector Maps
TL;DR: A fragile watermarking scheme for the content authentication of 2D vector maps that can not only detect and locate data modifications, but also characterize modification types is proposed.
References
More filters
Book
The Nature of Statistical Learning Theory
TL;DR: Setting of the learning problem consistency of learning processes bounds on the rate of convergence ofLearning processes controlling the generalization ability of learning process constructing learning algorithms what is important in learning theory?
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Image Features From Phase Congruency
TL;DR: Videre: Journal of Computer Vision Research is a quarterly journal published electronically on the Internet by The MIT Press, Cambridge, Massachusetts, 02142 and prices subject to change without notice.
Journal ArticleDOI
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications
TL;DR: It is shown that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone, and existing techniques are attacked by providing counterfeit water marking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership.