scispace - formally typeset
Book ChapterDOI

Video Authentication Using Relative Correlation Information and SVM

Reads0
Chats0
About
The article was published on 2008-01-01. It has received 12 citations till now. The article focuses on the topics: Authentication & Support vector machine.

read more

Citations
More filters

Video Authentication: Issues and Challenges

TL;DR: The issues in the designing of a video authentication system include the classification of tampering attacks, levels of tampering attack and robustness, and the categorization of existing video authentication techniques with their shortcomings are presented.
Journal ArticleDOI

Video Authentication- An Overview

TL;DR: A brief survey on video authentication techniques with their classification is presented, broadly classified into four categories: digital signature based techniques, watermarkbased techniques, intelligent techniques and other techniques.
Proceedings ArticleDOI

Learning based video authentication using statistical local information

TL;DR: An intelligent video authentication algorithm using support vector machine, which is a non-linear classifier, which computes the local information of the difference frames of given video statistically and classifies the video as tampered or non-tampered.
Proceedings ArticleDOI

Video authentication in digital forensic

TL;DR: An algorithm that is divided in two parts: computing the repeated frames by processing the image pixels to produce a frame-by-frame motion energy time and computing the tampering attack and its location with the help of the Support Vector Machine helps to predict whether the given video has been tampered or not.
Proceedings ArticleDOI

Video authentication based on statistical local information

TL;DR: The results show that the proposed algorithm has potential to be a reliable intelligent technique in digital video authentication without the need to use for SVM classifier which makes it faster and less computationally expensive in comparing with other intelligent techniques.
References
More filters
Proceedings ArticleDOI

Authentication of MPEG-4-based surveillance video

TL;DR: The concept provides a means for proving authenticity and integrity of MPEG-4 digital video streams, while leaving compatibility with standard media players untouched.
Journal ArticleDOI

Authentication of sequences with the SL 2 hash function: application to video sequences

TL;DR: The concatenation property of this one-way hash function TZ is emphasized, i.e. TZ(S j T) = TZ (S)TZ(T) where S and T are two binary strings to authenticate reports or interviews in a journalism context.
Proceedings ArticleDOI

Motion trajectory based video authentication

TL;DR: Any video can be authenticated by comparing its computed master key with the original master key, and this master key authentication information need not be embedded into the video, and the video quality is not affected by the auxiliary authentication information.
Proceedings ArticleDOI

An MPEG tolerant authentication system for video data

TL;DR: A secure video authentication algorithm that is tolerant to visual degradation due to MPEG lossy compression to a designed level and generation and verification of the tag can be integrated into the compression system.