Affiliation:
1. Saffrony Institute of Technology, India
2. Indian Institute of Technology (BHU), India
3. HCL Technologies, India
Abstract
With the growing innovations and emerging developments in sophisticated video editing technology, it is becoming highly desirable to assure the credibility and integrity of video information. Today digital videos are also increasingly transmitted over non-secure channels such as the Internet. Therefore, in surveillance, medical, and various other fields, video contents must be protected against attempts to manipulate them. Video authentication has gained much attention in recent years. However, many existing authentication techniques have their own advantages and obvious drawbacks. The authors propose a novel authentication technique that uses an intelligent approach for video authentication. This chapter presents an intelligent video authentication algorithm for raw videos using a support vector machine, which is a non-linear classifier, and its applications. It covers both kinds of tampering attacks, spatial and temporal. It uses a database of more than 2000 tampered and non-tampered videos and gives excellent results with 98.38% classification accuracy. The authors also discuss a vast diversity of tampering attacks, which can be possible for video sequences. Their algorithm gives good results for almost all kinds of tampering attacks.
Reference49 articles.
1. Authenticity. (1989). The Oxford English dictionary (2nd Ed.). Oxford, UK: Oxford University Press.
2. Authenticity. (n.d.). The Webster’s new 20th century dictionary. New York: Webster.
3. Video authentication with self-recovery
4. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications
5. Cross, D., & Mobasseri, B. G. (2002). Water marking for self authentication of compressed video. In Proc. IEEE International Conference on Image Processing. Rochester, NY: IEEE.