IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Video Authentication: An Intelligent Approach

Video Authentication: An Intelligent Approach
View Sample PDF
Author(s): Saurabh Upadhyay (Saffrony Institute of Technology, India), Shrikant Tiwari (Indian Institute of Technology (BHU), India)and Shalabh Parashar (HCL Technologies, India)
Copyright: 2018
Pages: 36
Source title: Digital Multimedia: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-3822-6.ch045

Purchase

View Video Authentication: An Intelligent Approach on the publisher's website for pricing and purchasing information.

Abstract

With the growing innovations and emerging developments in sophisticated video editing technology, it is becoming highly desirable to assure the credibility and integrity of video information. Today digital videos are also increasingly transmitted over non-secure channels such as the Internet. Therefore, in surveillance, medical, and various other fields, video contents must be protected against attempts to manipulate them. Video authentication has gained much attention in recent years. However, many existing authentication techniques have their own advantages and obvious drawbacks. The authors propose a novel authentication technique that uses an intelligent approach for video authentication. This chapter presents an intelligent video authentication algorithm for raw videos using a support vector machine, which is a non-linear classifier, and its applications. It covers both kinds of tampering attacks, spatial and temporal. It uses a database of more than 2000 tampered and non-tampered videos and gives excellent results with 98.38% classification accuracy. The authors also discuss a vast diversity of tampering attacks, which can be possible for video sequences. Their algorithm gives good results for almost all kinds of tampering attacks.

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom