scispace - formally typeset
Search or ask a question
Book ChapterDOI

Video Authentication Using Relative Correlation Information and SVM

About: The article was published on 2008-01-01. It has received 12 citations till now. The article focuses on the topics: Authentication & Support vector machine.
Citations
More filters
01 Jan 2012
TL;DR: The issues in the designing of a video authentication system include the classification of tampering attacks, levels of tampering attack and robustness, and the categorization of existing video authentication techniques with their shortcomings are presented.
Abstract: Video authentication aims to ensure the trustworthiness of the video by verifying the integrity and source of video data. It has gained much attention in the recent years. In this paper we present the issues in the designing of a video authentication system. These issues include the classification of tampering attacks, levels of tampering attack and robustness. Further we present the categorization of existing video authentication techniques with their shortcomings. Moreover we have also given the challenging scenarios in which the video authentication would be a critical task.

28 citations


Cites background or methods from "Video Authentication Using Relative..."

  • ...Moreover embedding the watermark may change the content of video which is not permissible in court of law [33]....

    [...]

  • ...The proposed algorithm in [33] is validated using a database of 795 tampered and non tampered videos and the results of algorithm show a classification accuracy of 99....

    [...]

  • ...A lot of works have been done that briefly address the classification based on where [33], [5]....

    [...]

  • ...In some applications the authenticity of video data is of paramount interest such as in video surveillance, forensic investigations, law enforcement and content ownership [33]....

    [...]

  • ...This attack is intended to camouflage the actual content and provide incorrect information [33]....

    [...]

Journal ArticleDOI
TL;DR: A brief survey on video authentication techniques with their classification is presented, broadly classified into four categories: digital signature based techniques, watermarkbased techniques, intelligent techniques and other techniques.
Abstract: With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are broadly classified into four categories: digital signature based techniques, watermark based techniques, intelligent techniques and other techniques. Furthermore we give the shortcomings of different categories of video authentication techniques in brief.

20 citations


Cites background or methods from "Video Authentication Using Relative..."

  • ...Moreover there also have been works on intelligent techniques for video authentication [33, 45]....

    [...]

  • ...Moreover embedding the watermark may change the content of video which is not permissible in court of law [33]....

    [...]

  • ...In today’s digital era, communication and compression techniques facilitate sharing of multimedia data such as image and video [33]....

    [...]

  • ...The proposed algorithm in [33] is validated using a database of 795 tampered and non tampered videos and the results of algorithm show a classification accuracy of 99....

    [...]

  • ...This algorithm [33] is performed in two stages: (1) SVM training and (2) Tamper detection and classification, using SVM....

    [...]

Proceedings ArticleDOI
22 Dec 2011
TL;DR: An intelligent video authentication algorithm using support vector machine, which is a non-linear classifier, which computes the local information of the difference frames of given video statistically and classifies the video as tampered or non-tampered.
Abstract: With the innovations and development in sophisticated video editing technology, it is becoming increasingly significant to assure the trustworthiness of video information. Today digital videos are also increasingly transmitted over non secure channels such as Internet. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. This paper presents an intelligent video authentication algorithm using support vector machine, which is a non-linear classifier. The proposed algorithm does not require the computation and storage of any secret key or embedding of any watermark. It computes the local information of the difference frames of given video statistically and classifies the video as tampered or non-tampered. It covers both kinds of tampering attacks, spatial and temporal. It uses a database of more than 4000 tampered and non-tampered video frames and gives excellent results with 99.12 classification accuracy.

14 citations

Proceedings ArticleDOI
01 Feb 2015
TL;DR: An algorithm that is divided in two parts: computing the repeated frames by processing the image pixels to produce a frame-by-frame motion energy time and computing the tampering attack and its location with the help of the Support Vector Machine helps to predict whether the given video has been tampered or not.
Abstract: The large amount of video content is being transmitted over internet and other channels. With the help of existing multimedia editing tools one can easily change the content of data which lead to lose the authenticity of the information. Thus, it becomes necessary to develop different methods by which the authenticity of the videos can be confirmed. In the past researchers have proposed several methods for authentication of videos. This paper presents an algorithm that is divided in two parts: computing the repeated frames by processing the image pixels to produce a frame-by-frame motion energy time and computing the tampering attack and its location with the help of the Support Vector Machine. This helps to predict whether the given video has been tampered or not.

13 citations


Cites background from "Video Authentication Using Relative..."

  • ...Therefore it has become important for the scientific communities to come up methods regarding the authenticating video recordings [8,12]....

    [...]

  • ...have been done in to the matter regarding the information including every pixels as well as frames [12]....

    [...]

Proceedings ArticleDOI
06 Dec 2016
TL;DR: The results show that the proposed algorithm has potential to be a reliable intelligent technique in digital video authentication without the need to use for SVM classifier which makes it faster and less computationally expensive in comparing with other intelligent techniques.
Abstract: With the outgrowth of video editing tools, video information trustworthiness becomes a hypersensitive field. Today many devices have the capability of capturing digital videos such as CCTV, digital cameras and mobile phones and these videos may transmitted over the Internet or any other non secure channel. As digital video can be used to as supporting evidence, it has to be protected against manipulation or tampering. As most video authentication techniques are based on watermarking and digital signatures, these techniques are effectively used in copyright purposes but difficult to implement in other cases such as video surveillance or in videos captured by consumer's cameras. In this paper we propose an intelligent technique for video authentication which uses the video local information which makes it useful for real world applications. The proposed algorithm relies on the video's statistical local information which was applied on a dataset of videos captured by a range of consumer video cameras. The results show that the proposed algorithm has potential to be a reliable intelligent technique in digital video authentication without the need to use for SVM classifier which makes it faster and less computationally expensive in comparing with other intelligent techniques.

6 citations


Cites background from "Video Authentication Using Relative..."

  • ...Keywords Video authentication; Tamper Detection; Digital Forensics; Tampering Attacks....

    [...]

  • ...Frame addition: where one or more frames are inserted within the sequence of frames....

    [...]

References
More filters
Proceedings ArticleDOI
16 Feb 2006
TL;DR: A semi-fragile watermarking scheme, which can be applied on still images as well as on digital videos, focuses on the protection of I-frames in compressed MPEG-1/2 videos and uses the entropy of the probability distribution of gray level values in block groups to generate a binary feature mask.
Abstract: There are several scenarios where the integrity of digital images and videos has to be verified. Examples can be found in videos captured by surveillance cameras. In this paper we propose a semi-fragile watermarking scheme, which can be applied on still images as well as on digital videos. We concentrate on the protection of I-frames in compressed MPEG-1/2 videos. We use the entropy of the probability distribution of gray level values in block groups to generate a binary feature mask, which is embedded robustly into an adjacent I-frame. The approach can distinguish between content-preserving and content-changing manipulations. Positions of content-changing manipulations can be localized. We provide experimental results to analyze the effectiveness of the scheme. In the evaluation part we concentrate on the robustness against content-preserving and the sensitivity to content-changing manipulations.

37 citations

Proceedings ArticleDOI
25 May 2003
TL;DR: This semi-fragile authentication solution can robustly tolerate some natural object manipulations and errors while securely preventing other malicious modifications and can achieve a good tradeoff among system robustness, security and complexity.
Abstract: This paper presents a semi-fragile object-based authentication solution for MPEG4 video. To protect the integrity of the video objects/sequences, a content-based watermark is embedded into each frame in the discrete Fourier transform (DFT) domain before the MPEG4 encoding. A set of angular radial transformation (ART) coefficients are selected as the robust features of the video objects. Error correction coding (ECC) is employed for watermark generation and embedding. Using this methodology, our semi-fragile authentication solution can robustly tolerate some natural object manipulations and errors (e.g. translation, scaling, rotation, lossy compression, segmentation errors, etc) while securely preventing other malicious modifications. Experimental results further demonstrate that the proposed method can achieve a good tradeoff among system robustness, security and complexity.

36 citations

Proceedings ArticleDOI
12 Nov 2001
TL;DR: A classification of video tampering methods and some issues on authenticating a broad sense video, the mixture of visual, audio and text data, are addressed.
Abstract: The development and spread of multimedia services require authentication techniques to prove the originality and integrity of multimedia data and (or) to localize the alterations made on the media. A wide variety of authentication techniques have been proposed in the literature, but most studies have been primarily focused on still images. In this paper, we will mainly address video authentication. We first summarize the classification of video tampering methods. Based on our proposed classification, the quality of existing authentication techniques can be evaluated. We then propose our own authentication system to combat those tampering methods. The comparison of two basic authentication categories, fragile watermark and digital signature, are made and the need for combining them are discussed. Finally, we address some issues on authenticating a broad sense video, the mixture of visual, audio and text data.

30 citations

Proceedings ArticleDOI
D. Cross1, Bijan G. Mobasseri
10 Dec 2002
TL;DR: This paper reports on watermarking of MPEG video for authentication and tamper detection with a proposed algorithm that operates entirely on the compressed bitstream and maintains MPEG-2 syntax throughout.
Abstract: This paper reports on watermarking of MPEG video for authentication and tamper detection. The algorithm operates entirely on the compressed bitstream and maintains MPEG-2 syntax throughout. In the proposed algorithm, I-frames watermark the entire length of the following GOP. The algorithm first computes the payload capacity of each GOP by identifying the population of eligible VLCs capable of carrying the watermarks. The candidate I-frame is then compressed to this target bit rate and the bits are reordered based on a GOP-unique key. The scrambled bits then sequentially watermark the GOP. Detection follows an inverse process. Watermarked video is resistant to tampering at the GOP level by observing the key sequencing needed for watermark extraction. Missing GOPs cause jumps in the required keys which can then be connected to the number of affected GOPs. Corruption or frame-level tampering inside a GOP can also be spotted using a similar approach.

29 citations

Proceedings ArticleDOI
TL;DR: A secure and flexible fragile digital video authentication watermark which also enables the self-recovery of video content after malicious manipulations is proposed.
Abstract: Digital video has become increasingly susceptible to spatio-temporal manipulations as a result of recent advances in video editing tools. In this paper, we propose a secure and flexible fragile digital video authentication watermark which also enables the self-recovery of video content after malicious manipulations. In the proposed block-based method, the watermark payload of a block is composed of two parts: authentication and recovery packets. The authentication packet is a digital signature with a special structure and carries the spatio-temporal position of the block. The digital signature guarantees the authenticity and integrity of the block as well as the recovery packet, whereas the localization information prevents possible cut & paste attacks. On the other hand, the recovery packet contains a highly compressed version of a spatio-temporally distant block. This information enables the recovery of the distant block, upon detection of tampering by its authentication packet. A spatio-temporal interleaving scheme and a simple multiple description coding mechanism increase the probability of self recovery by diffusing recovery information throughout the sequence. Finally, watermark payload is embedded by least significant bit modulation.

29 citations