2010 4th International Conference on Signal Processing and Communication Systems 2010
DOI: 10.1109/icspcs.2010.5709757
|View full text |Cite
|
Sign up to set email alerts
|

Digital video authentication with motion vector watermarking

Abstract: As the sophistication and proliferation of digital media continues to increase, so to do methods which seek to compromise data integrity. Digital authentication can be a critical component to ensuring reliability and security in digital video surveillance platforms. A robust method of encoding video can provide authentication ensuring that data has not been compromised and is still reliable.By watermarking motion vectors in a video stream, it is possible to authenticate said video and ensure it has not been co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Thus, they look to the video as a set of images without considering the temporal video specific domain. Some other techniques, in contrary, described for example in [51], [24], [52], and [53] among others suggest algorithms which use motion vectors. Most of these techniques involve encoding information within motion vectors as calculated by motion estimation blocks of various compression algorithms [8].…”
Section: Motion Vector Steganalysismentioning
confidence: 99%
“…Thus, they look to the video as a set of images without considering the temporal video specific domain. Some other techniques, in contrary, described for example in [51], [24], [52], and [53] among others suggest algorithms which use motion vectors. Most of these techniques involve encoding information within motion vectors as calculated by motion estimation blocks of various compression algorithms [8].…”
Section: Motion Vector Steganalysismentioning
confidence: 99%
“…For the robust digital video authentication, Aaron T. Sharp et al proposed [56] an authentication scheme which watermarks motion vectors in the video stream. The proposed method is not computationally complex, produces almost no visual distortion, and can be accomplished in real time [56].…”
Section: Watermarkingmentioning
confidence: 99%
“…The proposed method is not computationally complex, produces almost no visual distortion, and can be accomplished in real time [56]. Some of the authentication techniques implement watermarks that are invisible and robust, but they do not take the advantage of video specific properties [57,58].…”
Section: Watermarkingmentioning
confidence: 99%
“…VIDEO STEGANOGRAPHY AT TACK (8) As other steganographers have observed, video steganog raphy is fast becoming an interesting new steganographic medium which has enormous capacity compared with tradi tional steganographic cover mediums [14], [15], [16], [17], [11]. For this reason, we have chosen to apply our multi dimensional DST attack to video steganography.…”
Section: Dst For Video Mediamentioning
confidence: 99%
“…Motion vector steganography encodes information within the motion vectors of a video sequence typically by inter cepting the motion estimation block (as found in popular 2 video compression algorithms) and altering motion vectors in a certain way [14], [15], [16], [17]. This technique uti lizes motion between frames which is also considered a 3-dimensional medium for encoding.…”
Section: B Video Steganographymentioning
confidence: 99%