Skip to main content
Log in

Integrating SVM classification with SVD watermarking for intelligent video authentication

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In law enforcement applications such as surveillance and forensics, video is often presented as evidence. It is therefore of paramount importance to establish the authenticity and reliability of the video data. This paper presents an intelligent video authentication algorithm which integrates learning based Support Vector Machine classification with Singular Value Decomposition watermarking. During video capture and storage, intrinsic local correlation information is extracted from the frames and embedded in the frames at local levels. Tamper detection and classification is performed using the inherent video information and embedded correlation information. The proposed algorithm is independent of the choice of watermark and does not require any key to store. Further, it is robust to global tampering such as frame addition and removal, local attacks such as object alteration and can differentiate between acceptable operations and malicious tampering. Experiments are performed on an extensive database which contains non-tampered videos and videos with several types of tampering. The results show that the proposed algorithm outperforms existing video authentication algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bhattacharjee, S., & Kutter, M. (1998). Compression tolerant image authentication. In Proceedings of IEEE international conference on image processing (Vol. 1, pp. 435–439).

  2. Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. (2002). Video authentication with self recovery. In Proceedings of security and watermarking of multimedia contents (Vol. 4314, pp. 531–541).

  3. Cross, D., & Mobasseri, B. G. (2002). Watermarking for self authentication of compressed video. In Proceedings of IEEE international conference on image processing (Vol. 2, pp. 913–916).

  4. Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6),644–654.

    Article  Google Scholar 

  5. Ditmann, J., Steinmetz, A., & Steinmetz, R. (1999). Content based digital signature for motion pictures authentication and content fragile watermarking. In Proceedings of IEEE international conference on multimedia computing and systems (Vol. 2, pp. 209–213).

  6. He, D., Sun, O., & Tian, O. (2003). A semi fragile object based video authentication system. In Proceedings of international symposium on circuits and systems (Vol. 3, pp. 814–817).

  7. He, D., Sun, O., & Tian, O. (2004). A secure and robust object-based video authentication system. EURASIP Journal on Applied Signal Processing, 14, 2185–2200.

    Article  Google Scholar 

  8. Kong, W., Yang, B., Wu, D., & Niu, X. (2006). Blind video watermarking algorithm. In Proceedings of international conference on innovative computing, information and control (pp. 265–268).

  9. Kovesi, P. D. (1999). Image features from phase congruency. Journal of Computer Vision Research, 1(3).

  10. Latechi, L., Wildt, D., & Hu, J. (2001). Extraction of key frames from videos by optimal color composition matching and polygon simplification. In Proceedings of multimedia signal processing (pp. 245–250).

  11. Lin, C. Y., & Chang, S. F. (1999). Issues and solutions for authenticating MPEG video. SPIE Electronic Imaging Security and Watermarking of Multimedia Contents, 3657, 54–65.

    Google Scholar 

  12. Lu, C. S., & Liao, H. Y. M. (2003). Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Transactions on Multimedia, 5(2), 161–173.

    Article  Google Scholar 

  13. Mobasseri, B. G., & Evans, A. E. (2001). Content dependent video authentication by self water marking in color space. In Proceedings of security and watermarking of multimedia contents III (Vol. 4314, pp. 35–46).

  14. Pramateftakis, A., Oelbaum, T., & Diepold, K. (2004). Authentication of MPEG-4-based surveillance video. In Proceedings of IEEE international conference on image processing (Vol. 1, pp. 33–37).

  15. Queluz, M. P. (1998). Toward robust, content based techniques for image authentication. In Proceedings of IEEE second workshop on multimedia signal processing (pp. 297–302).

  16. Quisquater, J. (1997). Authentication of sequences with the SL2 hash function application to video sequences. Journal of Computer Security, 5(3), 213–223.

    Google Scholar 

  17. Singh, R., Vatsa, M., & Noore, A. (2006). Intelligent biometric information fusion using support vector machine. In M. Nachtegael, D. V. Weken, E. E. Kerre, & W. Philips (Eds.), Soft computing in image processing: recent advances (pp. 327–350). Berlin: Springer.

    Google Scholar 

  18. Sun, Q., Chang, F. S., & Maeno, K. (2002). A new semi fragile image authentication framework combining ECC and PKI infrastructure. In Proceedings of IEEE international symposium on circuits and systems (Vol. 2, pp. 440–443).

  19. Sun, Q., He, D., Zhang, Z., & Tian, Q. (2003). A secure and robust approach to scalable video authentication. In Proceedings of international conference on multimedia and expo (Vol. 2, pp. 209–212).

  20. Thiemert, S., Sahbi, H., & Steinebach, M. (2006). Using entropy for image and video authentication watermarks. In Proceedings of SPIE security, steganography, and watermarking of multimedia contents VIII (Vol. 6072, pp. 470–479).

  21. Uehara, T., Naini, R. S., & Ogunbona, P. (2004). An MPEG tolerant authentication system for video data. In Proceedings of IEEE international conference on multimedia and expo (Vol. 2, pp. 891–894).

  22. Vapnik, V. N. (1995). The nature of statistical learning theory. Berlin: Springer.

    Google Scholar 

  23. Wohlmacher, P. (1998). Requirements and mechanism of IT-security including aspects of multimedia security. In Proceedings of multimedia and security workshop at ACM multimedia (p. 11).

  24. Yan, W. Q., & Kankanhalli, M. S. (2003). Motion trajectory based video authentication. In Proceedings of international symposium on circuits and systems (Vol. 3, pp. 810–813).

  25. Yin, P., & Yu, H. H. (2001). Classification of video tampering methods and countermeasures using digital watermarking. In Proceedings of SPIE multimedia systems and applications IV (Vol. 4518, pp. 239–246).

  26. Zhao, L., Qi, W., Li, S., Yang, S., & Zhang, H. (2002). Key frame extraction and shot retrieval using nearest feature line (NFL). In Proceedings of international workshop on multimedia information retrieval. In conjunction with ACM multimedia conference (pp. 217–220).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richa Singh.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Singh, R., Vatsa, M., Singh, S.K. et al. Integrating SVM classification with SVD watermarking for intelligent video authentication. Telecommun Syst 40, 5–15 (2009). https://doi.org/10.1007/s11235-008-9141-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-008-9141-x

Keywords

Navigation