Skip to main content

Video Authentication Using Watermark and Digital Signature—A Study

  • Conference paper
  • First Online:
Proceedings of the First International Conference on Computational Intelligence and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 507))

Abstract

Widespread and easily available tools have become common for video synthesis and maneuvring in the digital era. It is therefore necessary, imperative and difficult as well to ensure the authenticity of video information. Authenticity and trustworthiness of the video is of paramount importance in a variety of areas like court of law, surveillance systems, journalism, advertisement, movie industry and medical world. Any malicious alteration or modification could affect the decisions taken based on these videos. Video authentication and tampering detection techniques due to intentional changes which are visible or invisible in a video are discussed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sowmya, K. N., and H. R. Chennamma. “A Survey On Video Forgery Detection.” International Journal of Computer Engineering and Applications 9. (1503.00843(2015).

    Google Scholar 

  2. http://www.oxforddictionaries.com/definition/english/authentication.

  3. Upadhyay, Saurabh, and Sanjay Kumar Singh. “Video Authentication-An Overview.” International Journal of Computer Science and Engineering Survey 2.4 (2011).

    Google Scholar 

  4. Kaur, Manpreet, Sonika Jindal, and Sunny Behal. “A study of digital image watermarking.” Journal of Research in Engineering and Applied Sciences 2, no. 2 (2012): 126–136.

    Google Scholar 

  5. Fridrich, Jiri, Miroslav Goljan, and Arnold C. Baldoza. “New fragile authentication watermark for images.” In Image Processing, 2000. Proceedings. 2000 International Conference on, vol. 1, pp. 446–449. IEEE, 2000.

    Google Scholar 

  6. Wang, Jen Tse, Wang Hsai Yang, Peng Cheng Wang, and Yung Tseng Chang. “A Novel Chaos Sequence Based 3D Fragile Watermarking Scheme.” In Computer, Consumer and Control (IS3C), 2014 International Symposium on, pp. 745–748. IEEE, 2014.

    Google Scholar 

  7. Mitrea, Mihai, and Marwen Hasnaoui. “Semi-fragile watermarking between theory and practice.” Proceedings of the Romanian Academy (2013): 328–327.

    Google Scholar 

  8. Maeno, Kurato, Qibin Sun, Shih-Fu Chang, and Masayuki Suto. “New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization.” Multimedia, IEEE Transactions on 8, no. 1 (2006): 32–45.

    Google Scholar 

  9. Fei, Chuhong, Deepa Kundur, and Raymond H. Kwong. “Analysis and design of secure watermark-based authentication systems.” Information Forensics and Security, IEEE Transactions on 1, no. 1 (2006): 43–55.

    Google Scholar 

  10. Sang, Jun, and Mohammad S. Alam. “Fragility and robustness of binary-phase-only-filter-based fragile/semifragile digital image watermarking.” Instrumentation and Measurement, IEEE Transactions on 57, no. 3 (2008): 595–606.

    Google Scholar 

  11. Chen, Siyue, and Henry Leung. “Chaotic watermarking for video authentication in surveillance applications.” Circuits and Systems for Video Technology, IEEE Transactions on 18, no. 5 (2008): 704–709.

    Google Scholar 

  12. Dutta, Tanima, Arijit Sur, and Sukumar Nandi. “A robust compressed domain video watermarking in P-frames with controlled bit rate increase.” In Communications (NCC), 2013 National Conference on, pp. 1–5. IEEE, 2013.

    Google Scholar 

  13. Jianfeng, Lu, Yang Zhenhua, Yang Fan, and Li Li. “A mpeg2 video watermarking algorithm based on dct domain.” In Digital Media and Digital Content Management (DMDCM), 2011 Workshop on, pp. 194–197. IEEE, 2011.

    Google Scholar 

  14. Kadam, Bhakti D., and Shilpa P. Metkar. “Digital video watermarking based on dither modulation.” In India Conference (INDICON), 2014 Annual IEEE, pp. 1–6. IEEE, 2014.

    Google Scholar 

  15. Feng, Gui, and Kai Huang. “H. 264 video standard based zero watermarking technology.” In Anti-Counterfeiting, Security and Identification (ASID), 2013 IEEE International Conference on, pp. 1–4. IEEE, 2013.

    Google Scholar 

  16. Fallahpour, Mehdi, Shervin Shirmohammadi, Mehdi Semsarzadeh, and Jiying Zhao. “Tampering Detection in Compressed Digital Video Using Watermarking.” IEEE T. Instrumentation and Measurement 63, no. 5 (2014): 1057–1072.

    Google Scholar 

  17. Cox, Ingemar J., Joe Kilian, F. Thomson Leighton, and Talal Shamoon. “Secure spread spectrum watermarking for multimedia.” Image Processing, IEEE Transactions on 6, no. 12 (1997): 1673–1687.

    Google Scholar 

  18. LU, Chia-Hung, et al. “Image authentication method by combining digital signature and watermarking.” IJCSES 1.2 (2007): 78.(Still doubt).

    Google Scholar 

  19. Mohanty, Saraju P., and Bharat K. Bhargava. “Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks.” ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) 5, no. 2 (2008): 12.

    Google Scholar 

  20. Prathik, P., Rahul Krishna, Rahul Ajay Nafde, and K. Shreedarshan. “An Adaptive blind video watermarking technique based on SD-BPSO and DWT-SVD.” In Computer Communication and Informatics (ICCCI), 2013 International Conference on, pp. 1–6. IEEE, 2013.

    Google Scholar 

  21. Raval, Keta, and S. Zafar. “Digital Watermarking with copyright authentication for image communication.” In Intelligent Systems and Signal Processing (ISSP), 2013 International Conference on, pp. 111–116. IEEE, 2013.

    Google Scholar 

  22. Singh, A. K., M. Dave, and Anand Mohan. “Performance comparison of wavelet filters against signal processing attacks.” In Image Information Processing (ICIIP), 2013 IEEE Second International Conference on, pp. 695–698. IEEE, 2013.

    Google Scholar 

  23. Hartung, Frank, and Bernd Girod. “Digital watermarking of MPEG-2 coded video in the bitstream domain.” In Acoustics, Speech, and Signal Processing, 1997. ICASSP-97., 1997 IEEE International Conference on, vol. 4, pp. 2621–2624. IEEE, 1997.

    Google Scholar 

  24. LIU, Hong, and Quan LIU. “Novel MPEG-2 Compression Domain-based Video Digital Watermarking Algorithm.” Journal of Wuhan University of Technology 7 (2008): 034.

    Google Scholar 

  25. Swamy, Prashanth, M. Girish Chandra, and B. S. Adiga. “On incorporating biometric based watermark for HD video using SVD and error correction codes.” In Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy (AICERA/ICMiCR), 2013 Annual International Conference on, pp. 1–6. IEEE, 2013.

    Google Scholar 

  26. Kumar, Manoj, and Arnold Hensman. “Robust digital video watermarking using reversible data hiding and visual cryptography.” (2013): 54–54.

    Google Scholar 

  27. Venugopala, P. S., H. Sarojadevi, Niranjan N. Chiplunkar, and Vani Bhat. “Video Watermarking by Adjusting the Pixel Values and Using Scene Change Detection.” In Signal and Image Processing (ICSIP), 2014 Fifth International Conference on, pp. 259–264. IEEE, 2014.

    Google Scholar 

  28. Subramanya, S. R., and Byung K. Yi. “Digital signatures.” Potentials, IEEE25.2 (2006):5–8.

    Google Scholar 

  29. Queluz, Maria Paula. “Towards robust, content based techniques for image authentication.” Multimedia Signal Processing, 1998 IEEE Second Workshop on. IEEE, 1998.

    Google Scholar 

  30. Dittmann, Jana, Arnd Steinmetz, and Ralf Steinmetz. “Content-based digital signature for motion pictures authentication and content-fragile watermarking.”Multimedia Computing and Systems, 1999. IEEE International Conference on. Vol. 2. IEEE, 1999.

    Google Scholar 

  31. Lin, Ching-Yung, and Shih-Fu Chang. “Issues and solutions for authenticating MPEG video.” Electronic Imaging’99. International Society for Optics and Photonics, 1999.

    Google Scholar 

  32. Ramaswamy, Nandakishore, and K. R. Rao. “Video authentication for H. 264/AVC using digital signature standard and secure hash algorithm.” In Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video, p. 21. ACM, 2006.

    Google Scholar 

  33. Navajit Saikia, Prabin K. Bora, Video Authentication Using Temporal Wavelet Transform, adcom, pp. 648–653, 15th International Conference on Advanced Computing and Communications (ADCOM 2007), 2007.

    Google Scholar 

  34. Tzeng, Chih-Hsuan, and Wen-Hsiang Tsai. “A new technique for authentication of image/video for multimedia applications.” In Proceedings of the 2001 workshop on Multimedia and security: new challenges, pp. 23–26. ACM, 2001.

    Google Scholar 

  35. Po-chyi Su, Chun-chieh Chen and Hong Min Chang, Towards effective content authentication for digital videos by employing feature extraction and quantization, IEEE Transactions on Circuits and Systems for Video Technology Volume 19, Issue 5 (May 2009), p: 668–677, 2009.

    Google Scholar 

  36. Xu, Zhihua, Hefei Ling, Fuhao Zou, Zhengding Lu, Ping Li, and Tianjiang Wang. “Fast and robust video copy detection scheme using full DCT coefficients.” In Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on, pp. 434–437. IEEE, 2009.

    Google Scholar 

  37. Kroputaponchai, Teerasak, and Nikom Suvonvorn. “Video authentication using spatio-temporal signature for surveillance system.” In Computer Science and Software Engineering (JCSSE), 2015 12th International Joint Conference on, pp. 24–29. IEEE, 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. N. Sowmya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Sowmya, K.N., Chennamma, H.R. (2017). Video Authentication Using Watermark and Digital Signature—A Study. In: Satapathy, S., Prasad, V., Rani, B., Udgata, S., Raju, K. (eds) Proceedings of the First International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore. https://doi.org/10.1007/978-981-10-2471-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2471-9_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2470-2

  • Online ISBN: 978-981-10-2471-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics