Share Email Print

Proceedings Paper

Classification of video tampering methods and countermeasures using digital watermarking
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

The development and spread of multimedia services require authentication techniques to prove the originality and integrity of multimedia data and (or) to localize the alterations made on the media. A wide variety of authentication techniques have been proposed in the literature, but most studies have been primarily focused on still images. In this paper, we will mainly address video authentication. We first summarize the classification of video tampering methods. Based on our proposed classification, the quality of existing authentication techniques can be evaluated. We then propose our own authentication system to combat those tampering methods. The comparison of two basic authentication categories, fragile watermark and digital signature, are made and the need for combining them are discussed. Finally, we address some issues on authenticating a broad sense video, the mixture of visual, audio and text data.

Paper Details

Date Published: 12 November 2001
PDF: 8 pages
Proc. SPIE 4518, Multimedia Systems and Applications IV, (12 November 2001); doi: 10.1117/12.448208
Show Author Affiliations
Peng Yin, Princeton Univ. (United States)
Hong Heather Yu, Panasonic Information and Networking Technology Lab. (United States)

Published in SPIE Proceedings Vol. 4518:
Multimedia Systems and Applications IV
Andrew G. Tescher; Bhaskaran Vasudev; V. Michael Bove Jr., Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?