Paper
12 November 2001 Classification of video tampering methods and countermeasures using digital watermarking
Author Affiliations +
Proceedings Volume 4518, Multimedia Systems and Applications IV; (2001) https://doi.org/10.1117/12.448208
Event: ITCom 2001: International Symposium on the Convergence of IT and Communications, 2001, Denver, CO, United States
Abstract
The development and spread of multimedia services require authentication techniques to prove the originality and integrity of multimedia data and (or) to localize the alterations made on the media. A wide variety of authentication techniques have been proposed in the literature, but most studies have been primarily focused on still images. In this paper, we will mainly address video authentication. We first summarize the classification of video tampering methods. Based on our proposed classification, the quality of existing authentication techniques can be evaluated. We then propose our own authentication system to combat those tampering methods. The comparison of two basic authentication categories, fragile watermark and digital signature, are made and the need for combining them are discussed. Finally, we address some issues on authenticating a broad sense video, the mixture of visual, audio and text data.
© (2001) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Peng Yin and Hong Heather Yu "Classification of video tampering methods and countermeasures using digital watermarking", Proc. SPIE 4518, Multimedia Systems and Applications IV, (12 November 2001); https://doi.org/10.1117/12.448208
Lens.org Logo
CITATIONS
Cited by 25 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Video

Multimedia

Visualization

Video compression

Symmetric-key encryption

Computer security

RELATED CONTENT


Back to Top