We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Review on Video/Image Authentication and Temper Detection Techniques

by Zarna Parmar, Saurabh Upadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 10
Year of Publication: 2013
Authors: Zarna Parmar, Saurabh Upadhyay
10.5120/10506-5281

Zarna Parmar, Saurabh Upadhyay . A Review on Video/Image Authentication and Temper Detection Techniques. International Journal of Computer Applications. 63, 10 ( February 2013), 46-49. DOI=10.5120/10506-5281

@article{ 10.5120/10506-5281,
author = { Zarna Parmar, Saurabh Upadhyay },
title = { A Review on Video/Image Authentication and Temper Detection Techniques },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 10 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 46-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number10/10506-5281/ },
doi = { 10.5120/10506-5281 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:14:00.234902+05:30
%A Zarna Parmar
%A Saurabh Upadhyay
%T A Review on Video/Image Authentication and Temper Detection Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 10
%P 46-49
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are generally classified into following categories: digital signature based techniques, watermark based techniques, and other authentication techniques.

References
  1. Saurabh Upadhyay, Sanjay Kumar Singh, Video Authentication: Issues and Challenges, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012.
  2. Saurabh Upadhyay, Sanjay Kumar Singh-"Video Authentication- An Overview", International Journal of Computer Science & Engineering Survey (IJCSES) Vol. 2, No. 4, November 2011.
  3. Ribnick, S. Atev, O. Masoud, R. Voyles and N. Papanikolopoulos, "Real-Time Detection of Camera Tampering", Proc. IEEE Int'l Conf. Advanced Video and Signal based Surveillance (AVSS 2006), pp. 10?10, Nov. 2006.
  4. R. Bausys and A. Kriukovas, "Digital Signature Approach for Image Authentication", Electronics and Electrical engineering, Vilnius Gediminas Technical University, Lithuania, ISSN 1392-1215. 2, No. 6(86), 2008.
  5. Ching-Yung Lin, "Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection," Ph. D. Thesis, Columbia University, Dec. 2000.
  6. Chih-Hsuan Tzeng, Wen-Hsiang Tsai, "A new technique for authentication of image/video for multimedia applications". MM&Sec 2001: 23-26
  7. Jamal HUSSEIN1 and Aree MOHAMMED2, "Robust Video Watermarking using Multi-Band Wavelet Transform", IJCSI International Journal of Computer cience Issues, Vol. 6, No. 1, 2009.
  8. Yuan-Liang Tang and Chih-Jung Hung, "Recoverable Authentication of Wavelet-Transformed Images," ICGST International Journal on Graphics, Vision and Image Processing, Vol. SI1, pp. 61-66, 2005.
  9. Nandakishore Ramaswamy, K. R. Rao, "Video authentication for H. 264/AVC using digital signature standard and secure hash algorithm", NOSSDAV 2006, 21.
  10. R N Mandavgane and N. G. Bawane. "Digital Signature Schemes for Secure Video. ", IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology, (NCIPET 2012) ncipet (4):1-4, March 2012.
  11. Weihong Wang, Hany Farid, "Exposing digital forgeries in video by detecting duplication", MM&Sec 2007: 35-42.
  12. Alin C. Popescu, Hany Farid, "Exposing digital forgeries by detecting traces of resampling", IEEE Transactions on Signal Processing, 53(2-2): 758-767 (2005).
  13. Ashwin Swaminathan, Min Wu, K. J. Ray Liu, " Image Tampering Identification using Blind Deconvolution", ICIP 2006: 2309-2312.
  14. Ching-Yung Lin and Shih-Fu Chang, "Generating Robust Digital Signature for Image/Video Authentication," Multimedia and Security Workshop at ACM Multimedia, Bristol, UK, Sept. 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Video Authentication Video Tempering Authentication Techniques