Video authentication is often presented as evidence in many criminal cases. Therefore, the authenticity of the video data is of paramount interest. This paper presents an intelligent video authentication algorithm using support vector machine. The proposed algorithm does not require the computation and storage of secret key or embedding of watermark. It computes the local relative correlation information and classifies the video as tampered or non-tampered. Performance of the proposed algorithm is not affected by acceptable video processing operations such as compression and scaling and effectively classifies the tampered videos. On a database of 795 videos, the proposed algorithm outperforms the existing algorithm by 18.5%.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bhattacharjee S, Kutter M (1998) Compression tolerant image authentication. In Proceedings of IEEE International Conference on Image Processing, 1:435–439
Celik MU, Sharma G, Tekalp AM, Saber E (2002) Video authentication with self recovery. In Proceedings of Security and Watermarking of Multimedia Contents IV, 4314:531–541
Cross D, Mobasseri BG (2002) Watermarking for self authentication of compressed video. In Proceedings of IEEE International Conference on Image Processing, 2:913–916
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644–654
Ditmann J, Steinmetz A, Steinmetz R (1999) Content based digital signature for motion pictures authentication and content fragile watermarking. In Proceedings of IEEE International Conference on Multimedia Computing and systems, 2:209–213
He D, Sun O, Tian O (2003) A semi fragile object based video authentication system. In Proceedings of International Symposium on Circuits and Systems, 3:814–817
He D, Sun O, Tian O (2004) A secure and robust object-based video authentication system. EURASIP Journal on Applied Signal Processing, 14:2185–2200
Kovesi PD (1999) Image features from phase congruency. Videre: Journal of Computer Vision Research, 1(3)
Latechi L, Wildt D, Hu J (2001) Extraction of key frames from videos by optimal color composition matching and polygon simplification. In Proceedings of Multimedia Signal Processing, 245–250
Lin CY, Chang SF (1999) Issues and solutions for authenticating MPEG video. In SPIE Electronic Imaging Security and Watermarking of Multimedia Contents, 3657:54–65
Lu CS, Liao HYM (2003) Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Transactions on Multimedia, 5(2):161–173
Mobasseri BG, Evans AE (2001) Content dependent video authentication by self water marking in color space. In Proceedings of Security and Watermarking of Multimedia Contents III 4314:35–46
Pramateftakis A, Oelbaum T, Diepold K (2004) Authentication of MPEG-4-based surveillance video. In Proceedings of IEEE International Conference on Image Processing, 1:33–37
Queluz MP (1998) Toward robust, content based techniques for image authentication. In Proceedings of IEEE Second Workshop on Multimedia Signal Processing, 297–302
Quisquater J (1997) Authentication of sequences with the SL2 hash function application to video sequences. Journal of Computer Security, 5(3):213–223
Singh R, Vatsa M, Noore A (2006) Intelligent biometric information fusion using vector machine. In Soft Computing in Image Processing: Recent Advances, Springer Verlag, 327–350
Sun Q, Chang FS, Maeno K (2002) A new semi fragile image authentication framework combining ECC and PKI infrastructure. In Proceedings of IEEE International Symposium on Circuits and Systems, 2:440–443
Sun Q, He D, Zhang Z, Tian Q (2003) A secure and robust approach to scalable video authentication. In Proceedings of International Conference on Multimedia and Expo, 2:209–212
Thiemert S, Sahbi H, Steinebach M (2006) Using entropy for image and video authentication watermarks. In Proceedings of the SPIE Security, Steganography, and Watermarking of Multimedia Contents VIII, 6072:470–479
Uehara T, Naini RS, Ogunbona P (2004) An MPEG tolerant authentication system for video data. In Proceedings of IEEE International Conference on Multimedia and Expo, 2:891–894
Vapnik VN (1995) The nature of statistical learning theory. Springer Verlag, Berlin
Wohlmacher P (1998) Requirements and mechanism of IT-security including aspects of multimedia security. In Proceedings of Multimedia and Security Workshop at ACM Multimedia, 11
Yan WQ, Kankanhalli MS (2003) Motion trajectory based video authentication. In Proceedings of International Symposium on Circuits and Systems, 3:810–813
Yin P, Yu HH (2001) Classification of video tampering methods and countermeasures using digital watermarking. In Proceedings of SPIE Multimedia Systems and Applications IV, 4518:239–246
Zhao L, Qi W, Li S, Yang S, Zhang H (2002) Key frame extraction and shot retrieval using Nearest Feature Line (NFL). In Proceedings of International Workshop on Multimedia Information Retrieval, in conjunction with ACM Multimedia Conference, 217–220
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Vatsa, M., Singh, R., Singh, S.K., Upadhyay, S. (2008). Video Authentication Using Relative Correlation Information and SVM. In: Hassanien, AE., Abraham, A., Kacprzyk, J. (eds) Computational Intelligence in Multimedia Processing: Recent Advances. Studies in Computational Intelligence, vol 96. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76827-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-540-76827-2_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-76826-5
Online ISBN: 978-3-540-76827-2
eBook Packages: EngineeringEngineering (R0)