Video Authentication: An Intelligent Approach

Video Authentication: An Intelligent Approach

Saurabh Upadhyay, Shrikant Tiwari, Shalabh Parashar
DOI: 10.4018/978-1-4666-4868-5.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With the growing innovations and emerging developments in sophisticated video editing technology, it is becoming highly desirable to assure the credibility and integrity of video information. Today digital videos are also increasingly transmitted over non-secure channels such as the Internet. Therefore, in surveillance, medical, and various other fields, video contents must be protected against attempts to manipulate them. Video authentication has gained much attention in recent years. However, many existing authentication techniques have their own advantages and obvious drawbacks. The authors propose a novel authentication technique that uses an intelligent approach for video authentication. This chapter presents an intelligent video authentication algorithm for raw videos using a support vector machine, which is a non-linear classifier, and its applications. It covers both kinds of tampering attacks, spatial and temporal. It uses a database of more than 2000 tampered and non-tampered videos and gives excellent results with 98.38% classification accuracy. The authors also discuss a vast diversity of tampering attacks, which can be possible for video sequences. Their algorithm gives good results for almost all kinds of tampering attacks.
Chapter Preview
Top

Introduction

With the rapid development and innovation in digital information technologies, video applications are infiltrating into our daily lives at breakneck speed, from traditional television broadcasting to Internet/Intranet, wireless communication and consumer products such as VCD/DVDs and smart phones. Though this immense development in digital information technology has brought us in the new era of powerful information, we are having some severe challenging issues related with the information. One of them is credibility of the information. Today, editing or modifying the content of a digital video can be done efficiently and seamlessly, and the credibility of the digital data decreases significantly (Friedman, 1993). To ensure the trustworthiness, authentication techniques (Lin & Chang, 2001; Naor & Pinkas, 1997; Perrig, Canetti, Tygar, & Song, 2000) are needed for verifying the originality of video content and preventing the forgery. Building a mechanism that enables media authenticity verification, is basically needed in court of law where digital media might be used as evidence against potential criminals. A possible scenario that justifies the need of such a mechanism is a case where a defendant claims that an incriminated media was fabricated.

So the video authentication is a process which ascertains that the content in a given video is authentic and exactly same as when captured. For verifying the originality of received video content, and to detect malicious tampering and preventing various types of forgeries, performed on video data, video authentication techniques are used.

These techniques also detect the types and locations of malicious tampering. In fact a wide range of powerful digital video processing tools are available in the market that allow extensive access, manipulations and reuse of visual materials (Hauzia & Noumeir, 2007). Since different video recording devices and close circuit television camera system become more convenient and affordable option in the private and public sectors, there is a corresponding increase in the frequency in which they are encountered in criminal investigations1. The video evidences have significant role in criminal investigations due to their ability to obtain detailed information from their own. And they have tremendous potential to assist in investigations. Therefore, it would be necessary to take utmost care to make sure that the given video evidence, presented in the court, is authentic.

Complete Chapter List

Search this Book:
Reset