A Review on Video Authentication Technique Exploiting Watermarking Methods

Author(s):  
Preeti Saini ◽  
Rakesh Ahuja ◽  
Amandeep Kaur
2018 ◽  
pp. 928-963
Author(s):  
Saurabh Upadhyay ◽  
Shrikant Tiwari ◽  
Shalabh Parashar

With the growing innovations and emerging developments in sophisticated video editing technology, it is becoming highly desirable to assure the credibility and integrity of video information. Today digital videos are also increasingly transmitted over non-secure channels such as the Internet. Therefore, in surveillance, medical, and various other fields, video contents must be protected against attempts to manipulate them. Video authentication has gained much attention in recent years. However, many existing authentication techniques have their own advantages and obvious drawbacks. The authors propose a novel authentication technique that uses an intelligent approach for video authentication. This chapter presents an intelligent video authentication algorithm for raw videos using a support vector machine, which is a non-linear classifier, and its applications. It covers both kinds of tampering attacks, spatial and temporal. It uses a database of more than 2000 tampered and non-tampered videos and gives excellent results with 98.38% classification accuracy. The authors also discuss a vast diversity of tampering attacks, which can be possible for video sequences. Their algorithm gives good results for almost all kinds of tampering attacks.


Author(s):  
Saurabh Upadhyay ◽  
Shrikant Tiwari ◽  
Shalabh Parashar

With the growing innovations and emerging developments in sophisticated video editing technology, it is becoming highly desirable to assure the credibility and integrity of video information. Today digital videos are also increasingly transmitted over non-secure channels such as the Internet. Therefore, in surveillance, medical, and various other fields, video contents must be protected against attempts to manipulate them. Video authentication has gained much attention in recent years. However, many existing authentication techniques have their own advantages and obvious drawbacks. The authors propose a novel authentication technique that uses an intelligent approach for video authentication. This chapter presents an intelligent video authentication algorithm for raw videos using a support vector machine, which is a non-linear classifier, and its applications. It covers both kinds of tampering attacks, spatial and temporal. It uses a database of more than 2000 tampered and non-tampered videos and gives excellent results with 98.38% classification accuracy. The authors also discuss a vast diversity of tampering attacks, which can be possible for video sequences. Their algorithm gives good results for almost all kinds of tampering attacks.


Optik ◽  
2013 ◽  
Vol 124 (19) ◽  
pp. 3827-3834 ◽  
Author(s):  
Yanjiao Shi ◽  
Miao Qi ◽  
Yugen Yi ◽  
Ming Zhang ◽  
Jun Kong

2017 ◽  
Vol 7 (1.2) ◽  
pp. 9 ◽  
Author(s):  
Shwetambari Kharabe ◽  
C. Nalini

Exploding growth in the field of electronic information technology, the finger vein authentication technique plays a vibrant role for personal identification and verification. In recent era, this technique is gaining popularity, as it provides a high security and convenience approach for personal authentication. Vein biometrics is an emerging methodologycomparing to other systems, due to its strengths of low forgery risk, aliveness detection and stableness over long period of time. Literatures published based on different techniques used forand authentication process are described and evaluated in this paper. These processes hadgained an outstanding promise in variety of applications and much attention among researchers to provide combine accuracy, universality and cost efficiency. This paper in brief, reviews various approaches used for finger vein segmentation and feature extraction. The reviews are based on finger vein basic principles, image acquisition methodology, pre-processing functions, segmentation, feature extraction,classification, matching and identification procedures, which are analyzed scientifically, thoroughly and comprehensively.Based on the analysis, the ideal process and procedure is identified, which will be an idyllic solution for finger vein authentication.


Sign in / Sign up

Export Citation Format

Share Document