Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 96))

Video authentication is often presented as evidence in many criminal cases. Therefore, the authenticity of the video data is of paramount interest. This paper presents an intelligent video authentication algorithm using support vector machine. The proposed algorithm does not require the computation and storage of secret key or embedding of watermark. It computes the local relative correlation information and classifies the video as tampered or non-tampered. Performance of the proposed algorithm is not affected by acceptable video processing operations such as compression and scaling and effectively classifies the tampered videos. On a database of 795 videos, the proposed algorithm outperforms the existing algorithm by 18.5%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bhattacharjee S, Kutter M (1998) Compression tolerant image authentication. In Proceedings of IEEE International Conference on Image Processing, 1:435–439

    Google Scholar 

  2. Celik MU, Sharma G, Tekalp AM, Saber E (2002) Video authentication with self recovery. In Proceedings of Security and Watermarking of Multimedia Contents IV, 4314:531–541

    Google Scholar 

  3. Cross D, Mobasseri BG (2002) Watermarking for self authentication of compressed video. In Proceedings of IEEE International Conference on Image Processing, 2:913–916

    Google Scholar 

  4. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644–654

    Article  MATH  MathSciNet  Google Scholar 

  5. Ditmann J, Steinmetz A, Steinmetz R (1999) Content based digital signature for motion pictures authentication and content fragile watermarking. In Proceedings of IEEE International Conference on Multimedia Computing and systems, 2:209–213

    Article  Google Scholar 

  6. He D, Sun O, Tian O (2003) A semi fragile object based video authentication system. In Proceedings of International Symposium on Circuits and Systems, 3:814–817

    Google Scholar 

  7. He D, Sun O, Tian O (2004) A secure and robust object-based video authentication system. EURASIP Journal on Applied Signal Processing, 14:2185–2200

    Google Scholar 

  8. Kovesi PD (1999) Image features from phase congruency. Videre: Journal of Computer Vision Research, 1(3)

    Google Scholar 

  9. Latechi L, Wildt D, Hu J (2001) Extraction of key frames from videos by optimal color composition matching and polygon simplification. In Proceedings of Multimedia Signal Processing, 245–250

    Google Scholar 

  10. Lin CY, Chang SF (1999) Issues and solutions for authenticating MPEG video. In SPIE Electronic Imaging Security and Watermarking of Multimedia Contents, 3657:54–65

    Google Scholar 

  11. Lu CS, Liao HYM (2003) Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Transactions on Multimedia, 5(2):161–173

    Article  MathSciNet  Google Scholar 

  12. Mobasseri BG, Evans AE (2001) Content dependent video authentication by self water marking in color space. In Proceedings of Security and Watermarking of Multimedia Contents III 4314:35–46

    Google Scholar 

  13. Pramateftakis A, Oelbaum T, Diepold K (2004) Authentication of MPEG-4-based surveillance video. In Proceedings of IEEE International Conference on Image Processing, 1:33–37

    Google Scholar 

  14. Queluz MP (1998) Toward robust, content based techniques for image authentication. In Proceedings of IEEE Second Workshop on Multimedia Signal Processing, 297–302

    Google Scholar 

  15. Quisquater J (1997) Authentication of sequences with the SL2 hash function application to video sequences. Journal of Computer Security, 5(3):213–223

    Google Scholar 

  16. Singh R, Vatsa M, Noore A (2006) Intelligent biometric information fusion using vector machine. In Soft Computing in Image Processing: Recent Advances, Springer Verlag, 327–350

    Google Scholar 

  17. Sun Q, Chang FS, Maeno K (2002) A new semi fragile image authentication framework combining ECC and PKI infrastructure. In Proceedings of IEEE International Symposium on Circuits and Systems, 2:440–443

    Google Scholar 

  18. Sun Q, He D, Zhang Z, Tian Q (2003) A secure and robust approach to scalable video authentication. In Proceedings of International Conference on Multimedia and Expo, 2:209–212

    Google Scholar 

  19. Thiemert S, Sahbi H, Steinebach M (2006) Using entropy for image and video authentication watermarks. In Proceedings of the SPIE Security, Steganography, and Watermarking of Multimedia Contents VIII, 6072:470–479

    Google Scholar 

  20. Uehara T, Naini RS, Ogunbona P (2004) An MPEG tolerant authentication system for video data. In Proceedings of IEEE International Conference on Multimedia and Expo, 2:891–894

    Google Scholar 

  21. Vapnik VN (1995) The nature of statistical learning theory. Springer Verlag, Berlin

    MATH  Google Scholar 

  22. Wohlmacher P (1998) Requirements and mechanism of IT-security including aspects of multimedia security. In Proceedings of Multimedia and Security Workshop at ACM Multimedia, 11

    Google Scholar 

  23. Yan WQ, Kankanhalli MS (2003) Motion trajectory based video authentication. In Proceedings of International Symposium on Circuits and Systems, 3:810–813

    Google Scholar 

  24. Yin P, Yu HH (2001) Classification of video tampering methods and countermeasures using digital watermarking. In Proceedings of SPIE Multimedia Systems and Applications IV, 4518:239–246

    Google Scholar 

  25. Zhao L, Qi W, Li S, Yang S, Zhang H (2002) Key frame extraction and shot retrieval using Nearest Feature Line (NFL). In Proceedings of International Workshop on Multimedia Information Retrieval, in conjunction with ACM Multimedia Conference, 217–220

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Vatsa, M., Singh, R., Singh, S.K., Upadhyay, S. (2008). Video Authentication Using Relative Correlation Information and SVM. In: Hassanien, AE., Abraham, A., Kacprzyk, J. (eds) Computational Intelligence in Multimedia Processing: Recent Advances. Studies in Computational Intelligence, vol 96. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76827-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-76827-2_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-76826-5

  • Online ISBN: 978-3-540-76827-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics