2016
DOI: 10.1007/978-981-10-2471-9_6
|View full text |Cite
|
Sign up to set email alerts
|

Video Authentication Using Watermark and Digital Signature—A Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…The watermarking techniques in the spatial domain use the pixel locations to embed the secret information while the techniques in the transformation domain use popular transformation like DCT, DWT, DFT etc. which take advantage of the spectral coefficients of the human visual system and these have been briefly explained by Sowmya and Chennamma [2] in their study for video authentication [2].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The watermarking techniques in the spatial domain use the pixel locations to embed the secret information while the techniques in the transformation domain use popular transformation like DCT, DWT, DFT etc. which take advantage of the spectral coefficients of the human visual system and these have been briefly explained by Sowmya and Chennamma [2] in their study for video authentication [2].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In 2017, Sowmya et al have proposed a literature study on video authentication using watermarking and digital signature where video authentication and tampering detection technique due to intentional changes which are visible or invisible in video are discussed. It also suggested video watermarking weakness and its robustness (Sowmya and Chennamma, 2017). Giri and Bashir (2017) have suggested the potential solution for multimedia authentication tool for digital data such as images, audio and video.…”
Section: Introductionmentioning
confidence: 99%