Book ChapterDOI
Video Authentication Using Relative Correlation Information and SVM
Mayank Vatsa,Richa Singh,Sanjay Singh,Saurabh Upadhyay +3 more
- pp 511-529
Reads0
Chats0
About:
The article was published on 2008-01-01. It has received 12 citations till now. The article focuses on the topics: Authentication & Support vector machine.read more
Citations
More filters
Video Authentication: Issues and Challenges
Saurabh Upadhyay,Sanjay Singh +1 more
TL;DR: The issues in the designing of a video authentication system include the classification of tampering attacks, levels of tampering attack and robustness, and the categorization of existing video authentication techniques with their shortcomings are presented.
Journal ArticleDOI
Video Authentication- An Overview
Saurabh Upadhyay,Sanjay Singh +1 more
TL;DR: A brief survey on video authentication techniques with their classification is presented, broadly classified into four categories: digital signature based techniques, watermarkbased techniques, intelligent techniques and other techniques.
Proceedings ArticleDOI
Learning based video authentication using statistical local information
Saurabh Upadhyay,Sanjay Singh +1 more
TL;DR: An intelligent video authentication algorithm using support vector machine, which is a non-linear classifier, which computes the local information of the difference frames of given video statistically and classifies the video as tampered or non-tampered.
Proceedings ArticleDOI
Video authentication in digital forensic
TL;DR: An algorithm that is divided in two parts: computing the repeated frames by processing the image pixels to produce a frame-by-frame motion energy time and computing the tampering attack and its location with the help of the Support Vector Machine helps to predict whether the given video has been tampered or not.
Proceedings ArticleDOI
Video authentication based on statistical local information
TL;DR: The results show that the proposed algorithm has potential to be a reliable intelligent technique in digital video authentication without the need to use for SVM classifier which makes it faster and less computationally expensive in comparing with other intelligent techniques.
References
More filters
Proceedings ArticleDOI
Authentication of MPEG-4-based surveillance video
TL;DR: The concept provides a means for proving authenticity and integrity of MPEG-4 digital video streams, while leaving compatibility with standard media players untouched.
Journal ArticleDOI
Authentication of sequences with the SL 2 hash function: application to video sequences
TL;DR: The concatenation property of this one-way hash function TZ is emphasized, i.e. TZ(S j T) = TZ (S)TZ(T) where S and T are two binary strings to authenticate reports or interviews in a journalism context.
Proceedings ArticleDOI
Motion trajectory based video authentication
Wei Qi Yan,Mohan S. Kankanhalli +1 more
TL;DR: Any video can be authenticated by comparing its computed master key with the original master key, and this master key authentication information need not be embedded into the video, and the video quality is not affected by the auxiliary authentication information.
Proceedings ArticleDOI
An MPEG tolerant authentication system for video data
TL;DR: A secure video authentication algorithm that is tolerant to visual degradation due to MPEG lossy compression to a designed level and generation and verification of the tag can be integrated into the compression system.