Intelligent Video Authentication: Algorithms and Applications

Intelligent Video Authentication: Algorithms and Applications

Saurabh Upadhyay, Shrikant Tiwari, Sanjay Kumar Singh
ISBN13: 9781466639584|ISBN10: 146663958X|EISBN13: 9781466639591
DOI: 10.4018/978-1-4666-3958-4.ch001
Cite Chapter Cite Chapter

MLA

Upadhyay, Saurabh, et al. "Intelligent Video Authentication: Algorithms and Applications." Intelligent Image and Video Interpretation: Algorithms and Applications, edited by Jing Tian and Li Chen, IGI Global, 2013, pp. 1-41. https://doi.org/10.4018/978-1-4666-3958-4.ch001

APA

Upadhyay, S., Tiwari, S., & Singh, S. K. (2013). Intelligent Video Authentication: Algorithms and Applications. In J. Tian & L. Chen (Eds.), Intelligent Image and Video Interpretation: Algorithms and Applications (pp. 1-41). IGI Global. https://doi.org/10.4018/978-1-4666-3958-4.ch001

Chicago

Upadhyay, Saurabh, Shrikant Tiwari, and Sanjay Kumar Singh. "Intelligent Video Authentication: Algorithms and Applications." In Intelligent Image and Video Interpretation: Algorithms and Applications, edited by Jing Tian and Li Chen, 1-41. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3958-4.ch001

Export Reference

Mendeley
Favorite

Abstract

With the innovations and development in sophisticated video editing technology, it is becoming increasingly significant to assure the trustworthiness of video information. Today digital videos are also increasingly transmitted over non-secure channels, such as the Internet. Therefore, in surveillance, medical, and various other fields, video content must be protected against attempts to manipulate them. Video authentication has gained much attention in recent years. However, many existing authentication techniques have their own advantages and obvious drawbacks; we propose a novel authentication technique that uses an intelligent approach for video authentication. This book chapter presents an intelligent video authentication algorithm using support vector machine, which is a non-linear classifier, and its applications. It covers both kinds of tampering attacks, spatial and temporal. It uses a database of more than 4000 tampered and non-tampered video frames and gives excellent results with 95% classification accuracy. The authors discuss a vast diversity of tampering attacks, which can be possible for video sequences. Their algorithm gives very good results for almost all kinds of tampering attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.