Academic Journals Database
Disseminating quality controlled scientific knowledge

Video Authentication- An Overview

Author(s): Saurabh Upadhyay | Sanjay Kumar Singh

Journal: International Journal of Computer Science and Engineering Survey
ISSN 0976-3252

Volume: 2;
Issue: 4;
Start page: 75;
Date: 2011;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Video authentication | Fragile watermarking | Digital signature | Intelligent techniques | Tampering attacks

With the innovations and development in sophisticated video editing technology and a wide spread ofvideo information and services in our society, it is becoming increasingly significant to assure thetrustworthiness of video information. Therefore in surveillance, medical and various other fields, videocontents must be protected against attempt to manipulate them. Such malicious alterations could affect thedecisions based on these videos. A lot of techniques are proposed by various researchers in the literaturethat assure the authenticity of video information in their own way. In this paper we present a brief surveyon video authentication techniques with their classification. These authentication techniques are broadlyclassified into four categories: digital signature based techniques, watermark based techniques, intelligenttechniques and other techniques. Furthermore we give the shortcomings of different categories of videoauthentication techniques in brief.
Affiliate Program     

Tango Jona
Tangokurs Rapperswil-Jona