2004
DOI: 10.1155/s1110865704312217
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Robust Object-Based Video Authentication System

Abstract:

An object-based video authentication system, which combines watermarking, error correction coding (ECC), and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART) coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Digital video applications have a large number of advantages compared with custom analog video, better image quality, better color reproduction, and sharper images. Additionally, with the development in digital technologies, a video is often simple to carried over the internet and it produces easy editing and cropping [6].…”
Section: Video Authentication Applicationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Digital video applications have a large number of advantages compared with custom analog video, better image quality, better color reproduction, and sharper images. Additionally, with the development in digital technologies, a video is often simple to carried over the internet and it produces easy editing and cropping [6].…”
Section: Video Authentication Applicationsmentioning
confidence: 99%
“…Some civilians have setup mobile CCTV systems in their home and even their cars just in case of anything happen and they need to secure themselves or discover a crime that can happen any time. In fact, the police originally setup cruiser video recording systems to protect themselves and also to protect the citizens [6] [7].…”
Section: Video Authentication Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [18,19], an error correcting code based watermarking algorithm is used to perform end-to-end video authentication. Other watermarking algorithms for video authentication can be found in [7,8,20].…”
Section: Literature Reviewmentioning
confidence: 99%
“…We compare the performance of the proposed video authentication algorithm with the motion trajectory based video authentication algorithm [24] and object watermarking based authentication algorithm [7]. Table 3 shows the theoretical and experimental comparison among the three algorithms.…”
Section: Performance Comparison With Existing Algorithmsmentioning
confidence: 99%