Video Authentication: Issues and Challenges

Video authentication aims to ensure the trustworthiness of the video by verifying the integrity and source of video data. It has gained much attention in the recent years. In this paper we present the issues in the designing of a video authentication system. These issues include the classification of tampering attacks, levels of tampering attack and robustness. Further we present the categorization of existing video authentication techniques with their shortcomings. Moreover we have also given the challenging scenarios in which the video authentication would be a critical task.

[1]  Rita Noumeir,et al.  Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.

[2]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.

[3]  Hong Heather Yu,et al.  Classification of video tampering methods and countermeasures using digital watermarking , 2001, SPIE ITCom.

[4]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, CRYPTO.

[5]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[6]  Richa Singh,et al.  Video Authentication Using Relative Correlation Information and SVM , 2008 .

[7]  John Price-Wilkin,et al.  Oxford English Dictionary (2nd ed.) , 1991 .

[8]  P.K. Bora,et al.  Video Authentication Using Temporal Wavelet Transform , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).

[9]  Mohan S. Kankanhalli,et al.  Digital Video Authentication , 2009 .

[10]  Mohan S. Kankanhalli,et al.  A hierarchical signature scheme for robust video authentication using secret sharing , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..

[11]  Hany Farid,et al.  Digital doctoring: how to tell the real from the fake , 2006 .

[12]  Mohan S. Kankanhalli,et al.  Motion trajectory based video authentication , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[15]  Marc Joye,et al.  Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences , 1997, J. Comput. Secur..

[16]  Shuangyuan Yang,et al.  Content-based image authentication: current status, issues, and challenges , 2007, International Conference on Semantic Computing (ICSC 2007).

[17]  Edwin K. P. Chong,et al.  Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[18]  Tiago Rosa Maria Paula Queluz Authentication of digital images and video: Generic models and a new contribution , 2001, Signal processing. Image communication.

[19]  Chun-Chieh Chen,et al.  Towards Effective Content Authentication for Digital Videos by Employing Feature Extraction and Quantization , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Tiago Rosa Maria Paula Queluz Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[21]  Ralf Steinmetz,et al.  Multimedia and Security Workshop at ACM Multimedia , 1998 .

[22]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[23]  Shih-Fu Chang,et al.  Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.

[24]  Li Zhao,et al.  Key-frame extraction and shot retrieval using nearest feature line (NFL) , 2000, MULTIMEDIA '00.

[25]  Anirban Mukherjee,et al.  Media-independent watermarking classification and the need for combining digital video and audio watermarking for media authentication , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[26]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.

[27]  Jianying Hu,et al.  Extraction of key frames from videos by optimal color composition matching and polygon simplification , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[28]  Riccardo Leonardi,et al.  A new video authentication template based on bubble random sampling , 2005, 2005 13th European Signal Processing Conference.

[29]  Richa Singh,et al.  Intelligent Biometric Information Fusion using Support Vector Machine , 2007 .

[30]  A. Murat Tekalp,et al.  Video authentication with self-recovery , 2002, IS&T/SPIE Electronic Imaging.

[31]  Peter Kovesi,et al.  Image Features from Phase Congruency , 1995 .

[32]  Richa Singh,et al.  Integrating SVM classification with SVD watermarking for intelligent video authentication , 2009, Telecommun. Syst..

[33]  Bijan G. Mobasseri,et al.  Content authentication and tamper detection in digital video , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[34]  Bijan G. Mobasseri,et al.  Content-dependent video authentication by self-watermarking in color space , 2001, IS&T/SPIE Electronic Imaging.