A Review on Video/Image Authentication and Temper Detection Techniques

With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are generally classified into following categories: digital signature based techniques, watermark based techniques, and other authentication techniques.

[1]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting duplication , 2007, MM&Sec.

[2]  K. R. Rao,et al.  Video authentication for H.264/AVC using digital signature standard and secure hash algorithm , 2006, NOSSDAV '06.

[3]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[4]  Wen-Hsiang Tsai,et al.  A new technique for authentication of image/video for multimedia applications , 2001, MM&Sec '01.

[5]  Min Wu,et al.  Image Tampering Identification using Blind Deconvolution , 2006, 2006 International Conference on Image Processing.

[6]  Osama Masoud,et al.  Real-Time Detection of Camera Tampering , 2006, 2006 IEEE International Conference on Video and Signal Based Surveillance.

[7]  Aree Ali Mohammed,et al.  Robust Video Watermarking using Multi-Band Wavelet Transform , 2009, ArXiv.

[8]  Yuan-Liang Tang,et al.  Recoverable Authentication of Wavelet-Transformed Images , 2005 .

[9]  Sanjay Kumar Singh,et al.  Video Authentication- An Overview , 2011 .

[10]  Romualdas Bausys,et al.  Digital Signature Approach for Image Authentication , 2008 .

[11]  R. N. Mandavgane,et al.  Digital Signatura Schemes for Secure Video , 2012 .

[12]  Sanjay Kumar Singh,et al.  Video Authentication: Issues and Challenges , 2012 .

[13]  Shih-Fu Chang,et al.  Generating Robust Digital Signature for Image/Video Authentication , 1998 .

[14]  Ching-Yung Lin Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection , 2000 .