CFP last date
20 December 2024
Reseach Article

Digital Signatura Schemes for Secure Video

Published on March 2012 by R. N. Mandavgane, N.G.Bawane
2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Foundation of Computer Science USA
NCIPET - Number 4
March 2012
Authors: R. N. Mandavgane, N.G.Bawane
ca651215-f974-491d-a8d5-3a260480cbd6

R. N. Mandavgane, N.G.Bawane . Digital Signatura Schemes for Secure Video. 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013). NCIPET, 4 (March 2012), 1-4.

@article{
author = { R. N. Mandavgane, N.G.Bawane },
title = { Digital Signatura Schemes for Secure Video },
journal = { 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) },
issue_date = { March 2012 },
volume = { NCIPET },
number = { 4 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/ncipet/number4/5213-1025/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%A R. N. Mandavgane
%A N.G.Bawane
%T Digital Signatura Schemes for Secure Video
%J 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%@ 0975-8887
%V NCIPET
%N 4
%P 1-4
%D 2012
%I International Journal of Computer Applications
Abstract

Wireless multimedia delivery is becoming increasingly important in today's networks. Due to the explosive growth of the Internet and increasing demand for multimedia information on the web, streaming video over wireless networks has received tremendous attention from academia and industry. Data origin and data integrity authentication are very important factors in video security. Extensive research has been conducted in this area with different techniques. In this paper, digital signature techniques are reviewed for authenticating video.

References
  1. Jean Jacques Quisquater, Marc Joye, “Authentication of Sequences with the SL2 Hash Function: Application to Video sequences”, Published in Journal of Computer Security , pp 213-223, !997.
  2. J.J Quisquater, B. Marq, M. Joye and A. Bernard, “ Practical Solution to Authentication of Images With A secure Camera”, Published in I.K.Sethi and R.C. Jain, Eds., Storage and retrieval for Image and video Databases V, Vol. 3022 of Proc.SPIE pp. 290-197, SPIE, 1997.
  3. Ching-yung lin andshia-fu chang, “Issues and Solutions for Authenticating MPEG Video”, IEEE International conference on Acoustics, Speech and Signal processing, vol. 3657 pp 54-65, April1999. [4 ]Jana Dittmann, Arnd Steinmetz, Ralf Steinmetz, “ Content based digital Signature for Motion picture Authentication and Content Fragile Watermarking” In IEEE international conference on multimedia computing and systems, vol. 2, pp 209-213, 1999
  4. Chih Husan Tzeng and Wen Hsiang Tsai, “A New Technique for Authentication of Image/Video for Multimedia Applications”, In Multimedia and security workshop at ACM multimedia, Ottawa ,Canada, pp 23-26, 2001
  5. Wei Qi Yan and Mohan Kankanhalli, “Motion Trajectory Based Video Authentication”, IEEE ISCAS, Bangkok, vol. 3, pp 810-813, 2003
  6. Pradeep K. Atrey , Wei Qi Yan and Mohan S. Kankanhalli , “A scalable signature scheme for video authentication,” Multimedia Tools Appl.,vol 34, pp 107-135, July 2007.
  7. Pradeep K. Atrey , Wei Qi Yan and Mohan S. Kankanhalli , “ A Hierarchical Signature Scheme for Robust Video Authentication using secret sharing”, In International Multimedia Modeling conference, Brisbane ,Australia, pp 330-337. 2004
  8. Ee-Chien Chang, Mohan S. Kankanhalli, Xin Guan, Zhiyong huang, yinghui Wu, “ Robust Image Authentication using Content Based compression”, In Multimedia Systems,Springer-Verlog 2003
  9. Marc Schneider and Shih-Fu-Chang, “A Robust Content based Digital Signature for Image Authentication”, IEEE Internatinal conference on Image Processing, Lausanne, Switzerland, pp. 227-230, 1996.
  10. Ching-Yung Lin And Shih-Fu Chang, “Generating Robust Digital Signature for Image/Video Authentication”, In Multimedia and Security Workshop at ACM Multimedia 98, Bristol U.K. September 1998.
  11. J. F. Canny, “A Computational approach to edge detection” IEEE Trans. On Pattern analysis and machine intelligence. Vol. PAMI-8, Nov. 1986.
Index Terms

Computer Science
Information Sciences

Keywords

Digital signature authentication video