Video Authentication Using Relative Correlation Information and SVM
Citations
28 citations
Cites background or methods from "Video Authentication Using Relative..."
...Moreover embedding the watermark may change the content of video which is not permissible in court of law [33]....
[...]
...The proposed algorithm in [33] is validated using a database of 795 tampered and non tampered videos and the results of algorithm show a classification accuracy of 99....
[...]
...A lot of works have been done that briefly address the classification based on where [33], [5]....
[...]
...In some applications the authenticity of video data is of paramount interest such as in video surveillance, forensic investigations, law enforcement and content ownership [33]....
[...]
...This attack is intended to camouflage the actual content and provide incorrect information [33]....
[...]
20 citations
Cites background or methods from "Video Authentication Using Relative..."
...Moreover there also have been works on intelligent techniques for video authentication [33, 45]....
[...]
...Moreover embedding the watermark may change the content of video which is not permissible in court of law [33]....
[...]
...In today’s digital era, communication and compression techniques facilitate sharing of multimedia data such as image and video [33]....
[...]
...The proposed algorithm in [33] is validated using a database of 795 tampered and non tampered videos and the results of algorithm show a classification accuracy of 99....
[...]
...This algorithm [33] is performed in two stages: (1) SVM training and (2) Tamper detection and classification, using SVM....
[...]
14 citations
13 citations
Cites background from "Video Authentication Using Relative..."
...Therefore it has become important for the scientific communities to come up methods regarding the authenticating video recordings [8,12]....
[...]
...have been done in to the matter regarding the information including every pixels as well as frames [12]....
[...]
6 citations
Cites background from "Video Authentication Using Relative..."
...Keywords Video authentication; Tamper Detection; Digital Forensics; Tampering Attacks....
[...]
...Frame addition: where one or more frames are inserted within the sequence of frames....
[...]
References
37 citations
36 citations
30 citations
29 citations
29 citations