Video Authentication: Issues and Challenges
暂无分享,去创建一个
[1] Rita Noumeir,et al. Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.
[2] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.
[3] Hong Heather Yu,et al. Classification of video tampering methods and countermeasures using digital watermarking , 2001, SPIE ITCom.
[4] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[5] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[6] Richa Singh,et al. Video Authentication Using Relative Correlation Information and SVM , 2008 .
[7] John Price-Wilkin,et al. Oxford English Dictionary (2nd ed.) , 1991 .
[8] P.K. Bora,et al. Video Authentication Using Temporal Wavelet Transform , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).
[9] Mohan S. Kankanhalli,et al. Digital Video Authentication , 2009 .
[10] Mohan S. Kankanhalli,et al. A hierarchical signature scheme for robust video authentication using secret sharing , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..
[11] Hany Farid,et al. Digital doctoring: how to tell the real from the fake , 2006 .
[12] Mohan S. Kankanhalli,et al. Motion trajectory based video authentication , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[13] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[14] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[15] Marc Joye,et al. Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences , 1997, J. Comput. Secur..
[16] Shuangyuan Yang,et al. Content-based image authentication: current status, issues, and challenges , 2007, International Conference on Semantic Computing (ICSC 2007).
[17] Edwin K. P. Chong,et al. Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[18] Tiago Rosa Maria Paula Queluz. Authentication of digital images and video: Generic models and a new contribution , 2001, Signal processing. Image communication.
[19] Chun-Chieh Chen,et al. Towards Effective Content Authentication for Digital Videos by Employing Feature Extraction and Quantization , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[20] Tiago Rosa Maria Paula Queluz. Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[21] Ralf Steinmetz,et al. Multimedia and Security Workshop at ACM Multimedia , 1998 .
[22] Ralf Steinmetz,et al. Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[23] Shih-Fu Chang,et al. Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.
[24] Li Zhao,et al. Key-frame extraction and shot retrieval using nearest feature line (NFL) , 2000, MULTIMEDIA '00.
[25] Anirban Mukherjee,et al. Media-independent watermarking classification and the need for combining digital video and audio watermarking for media authentication , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[26] Weihong Wang,et al. Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.
[27] Jianying Hu,et al. Extraction of key frames from videos by optimal color composition matching and polygon simplification , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[28] Riccardo Leonardi,et al. A new video authentication template based on bubble random sampling , 2005, 2005 13th European Signal Processing Conference.
[29] Richa Singh,et al. Intelligent Biometric Information Fusion using Support Vector Machine , 2007 .
[30] A. Murat Tekalp,et al. Video authentication with self-recovery , 2002, IS&T/SPIE Electronic Imaging.
[31] Peter Kovesi,et al. Image Features from Phase Congruency , 1995 .
[32] Richa Singh,et al. Integrating SVM classification with SVD watermarking for intelligent video authentication , 2009, Telecommun. Syst..
[33] Bijan G. Mobasseri,et al. Content authentication and tamper detection in digital video , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[34] Bijan G. Mobasseri,et al. Content-dependent video authentication by self-watermarking in color space , 2001, IS&T/SPIE Electronic Imaging.