Share Email Print
cover

Proceedings Paper

Classification of video tampering methods and countermeasures using digital watermarking
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

The development and spread of multimedia services require authentication techniques to prove the originality and integrity of multimedia data and (or) to localize the alterations made on the media. A wide variety of authentication techniques have been proposed in the literature, but most studies have been primarily focused on still images. In this paper, we will mainly address video authentication. We first summarize the classification of video tampering methods. Based on our proposed classification, the quality of existing authentication techniques can be evaluated. We then propose our own authentication system to combat those tampering methods. The comparison of two basic authentication categories, fragile watermark and digital signature, are made and the need for combining them are discussed. Finally, we address some issues on authenticating a broad sense video, the mixture of visual, audio and text data.

Paper Details

Date Published: 12 November 2001
PDF: 8 pages
Proc. SPIE 4518, Multimedia Systems and Applications IV, (12 November 2001); doi: 10.1117/12.448208
Show Author Affiliations
Peng Yin, Princeton Univ. (United States)
Hong Heather Yu, Panasonic Information and Networking Technology Lab. (United States)


Published in SPIE Proceedings Vol. 4518:
Multimedia Systems and Applications IV
Andrew G. Tescher; Bhaskaran Vasudev; V. Michael Bove, Editor(s)

© SPIE. Terms of Use
Back to Top