Abstract
Widespread and easily available tools have become common for video synthesis and maneuvring in the digital era. It is therefore necessary, imperative and difficult as well to ensure the authenticity of video information. Authenticity and trustworthiness of the video is of paramount importance in a variety of areas like court of law, surveillance systems, journalism, advertisement, movie industry and medical world. Any malicious alteration or modification could affect the decisions taken based on these videos. Video authentication and tampering detection techniques due to intentional changes which are visible or invisible in a video are discussed in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sowmya, K. N., and H. R. Chennamma. “A Survey On Video Forgery Detection.” International Journal of Computer Engineering and Applications 9. (1503.00843(2015).
http://www.oxforddictionaries.com/definition/english/authentication.
Upadhyay, Saurabh, and Sanjay Kumar Singh. “Video Authentication-An Overview.” International Journal of Computer Science and Engineering Survey 2.4 (2011).
Kaur, Manpreet, Sonika Jindal, and Sunny Behal. “A study of digital image watermarking.” Journal of Research in Engineering and Applied Sciences 2, no. 2 (2012): 126–136.
Fridrich, Jiri, Miroslav Goljan, and Arnold C. Baldoza. “New fragile authentication watermark for images.” In Image Processing, 2000. Proceedings. 2000 International Conference on, vol. 1, pp. 446–449. IEEE, 2000.
Wang, Jen Tse, Wang Hsai Yang, Peng Cheng Wang, and Yung Tseng Chang. “A Novel Chaos Sequence Based 3D Fragile Watermarking Scheme.” In Computer, Consumer and Control (IS3C), 2014 International Symposium on, pp. 745–748. IEEE, 2014.
Mitrea, Mihai, and Marwen Hasnaoui. “Semi-fragile watermarking between theory and practice.” Proceedings of the Romanian Academy (2013): 328–327.
Maeno, Kurato, Qibin Sun, Shih-Fu Chang, and Masayuki Suto. “New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization.” Multimedia, IEEE Transactions on 8, no. 1 (2006): 32–45.
Fei, Chuhong, Deepa Kundur, and Raymond H. Kwong. “Analysis and design of secure watermark-based authentication systems.” Information Forensics and Security, IEEE Transactions on 1, no. 1 (2006): 43–55.
Sang, Jun, and Mohammad S. Alam. “Fragility and robustness of binary-phase-only-filter-based fragile/semifragile digital image watermarking.” Instrumentation and Measurement, IEEE Transactions on 57, no. 3 (2008): 595–606.
Chen, Siyue, and Henry Leung. “Chaotic watermarking for video authentication in surveillance applications.” Circuits and Systems for Video Technology, IEEE Transactions on 18, no. 5 (2008): 704–709.
Dutta, Tanima, Arijit Sur, and Sukumar Nandi. “A robust compressed domain video watermarking in P-frames with controlled bit rate increase.” In Communications (NCC), 2013 National Conference on, pp. 1–5. IEEE, 2013.
Jianfeng, Lu, Yang Zhenhua, Yang Fan, and Li Li. “A mpeg2 video watermarking algorithm based on dct domain.” In Digital Media and Digital Content Management (DMDCM), 2011 Workshop on, pp. 194–197. IEEE, 2011.
Kadam, Bhakti D., and Shilpa P. Metkar. “Digital video watermarking based on dither modulation.” In India Conference (INDICON), 2014 Annual IEEE, pp. 1–6. IEEE, 2014.
Feng, Gui, and Kai Huang. “H. 264 video standard based zero watermarking technology.” In Anti-Counterfeiting, Security and Identification (ASID), 2013 IEEE International Conference on, pp. 1–4. IEEE, 2013.
Fallahpour, Mehdi, Shervin Shirmohammadi, Mehdi Semsarzadeh, and Jiying Zhao. “Tampering Detection in Compressed Digital Video Using Watermarking.” IEEE T. Instrumentation and Measurement 63, no. 5 (2014): 1057–1072.
Cox, Ingemar J., Joe Kilian, F. Thomson Leighton, and Talal Shamoon. “Secure spread spectrum watermarking for multimedia.” Image Processing, IEEE Transactions on 6, no. 12 (1997): 1673–1687.
LU, Chia-Hung, et al. “Image authentication method by combining digital signature and watermarking.” IJCSES 1.2 (2007): 78.(Still doubt).
Mohanty, Saraju P., and Bharat K. Bhargava. “Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks.” ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) 5, no. 2 (2008): 12.
Prathik, P., Rahul Krishna, Rahul Ajay Nafde, and K. Shreedarshan. “An Adaptive blind video watermarking technique based on SD-BPSO and DWT-SVD.” In Computer Communication and Informatics (ICCCI), 2013 International Conference on, pp. 1–6. IEEE, 2013.
Raval, Keta, and S. Zafar. “Digital Watermarking with copyright authentication for image communication.” In Intelligent Systems and Signal Processing (ISSP), 2013 International Conference on, pp. 111–116. IEEE, 2013.
Singh, A. K., M. Dave, and Anand Mohan. “Performance comparison of wavelet filters against signal processing attacks.” In Image Information Processing (ICIIP), 2013 IEEE Second International Conference on, pp. 695–698. IEEE, 2013.
Hartung, Frank, and Bernd Girod. “Digital watermarking of MPEG-2 coded video in the bitstream domain.” In Acoustics, Speech, and Signal Processing, 1997. ICASSP-97., 1997 IEEE International Conference on, vol. 4, pp. 2621–2624. IEEE, 1997.
LIU, Hong, and Quan LIU. “Novel MPEG-2 Compression Domain-based Video Digital Watermarking Algorithm.” Journal of Wuhan University of Technology 7 (2008): 034.
Swamy, Prashanth, M. Girish Chandra, and B. S. Adiga. “On incorporating biometric based watermark for HD video using SVD and error correction codes.” In Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy (AICERA/ICMiCR), 2013 Annual International Conference on, pp. 1–6. IEEE, 2013.
Kumar, Manoj, and Arnold Hensman. “Robust digital video watermarking using reversible data hiding and visual cryptography.” (2013): 54–54.
Venugopala, P. S., H. Sarojadevi, Niranjan N. Chiplunkar, and Vani Bhat. “Video Watermarking by Adjusting the Pixel Values and Using Scene Change Detection.” In Signal and Image Processing (ICSIP), 2014 Fifth International Conference on, pp. 259–264. IEEE, 2014.
Subramanya, S. R., and Byung K. Yi. “Digital signatures.” Potentials, IEEE25.2 (2006):5–8.
Queluz, Maria Paula. “Towards robust, content based techniques for image authentication.” Multimedia Signal Processing, 1998 IEEE Second Workshop on. IEEE, 1998.
Dittmann, Jana, Arnd Steinmetz, and Ralf Steinmetz. “Content-based digital signature for motion pictures authentication and content-fragile watermarking.”Multimedia Computing and Systems, 1999. IEEE International Conference on. Vol. 2. IEEE, 1999.
Lin, Ching-Yung, and Shih-Fu Chang. “Issues and solutions for authenticating MPEG video.” Electronic Imaging’99. International Society for Optics and Photonics, 1999.
Ramaswamy, Nandakishore, and K. R. Rao. “Video authentication for H. 264/AVC using digital signature standard and secure hash algorithm.” In Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video, p. 21. ACM, 2006.
Navajit Saikia, Prabin K. Bora, Video Authentication Using Temporal Wavelet Transform, adcom, pp. 648–653, 15th International Conference on Advanced Computing and Communications (ADCOM 2007), 2007.
Tzeng, Chih-Hsuan, and Wen-Hsiang Tsai. “A new technique for authentication of image/video for multimedia applications.” In Proceedings of the 2001 workshop on Multimedia and security: new challenges, pp. 23–26. ACM, 2001.
Po-chyi Su, Chun-chieh Chen and Hong Min Chang, Towards effective content authentication for digital videos by employing feature extraction and quantization, IEEE Transactions on Circuits and Systems for Video Technology Volume 19, Issue 5 (May 2009), p: 668–677, 2009.
Xu, Zhihua, Hefei Ling, Fuhao Zou, Zhengding Lu, Ping Li, and Tianjiang Wang. “Fast and robust video copy detection scheme using full DCT coefficients.” In Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on, pp. 434–437. IEEE, 2009.
Kroputaponchai, Teerasak, and Nikom Suvonvorn. “Video authentication using spatio-temporal signature for surveillance system.” In Computer Science and Software Engineering (JCSSE), 2015 12th International Joint Conference on, pp. 24–29. IEEE, 2015.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Sowmya, K.N., Chennamma, H.R. (2017). Video Authentication Using Watermark and Digital Signature—A Study. In: Satapathy, S., Prasad, V., Rani, B., Udgata, S., Raju, K. (eds) Proceedings of the First International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore. https://doi.org/10.1007/978-981-10-2471-9_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-2471-9_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2470-2
Online ISBN: 978-981-10-2471-9
eBook Packages: EngineeringEngineering (R0)