Video Authentication using PLEXUS Method
2018, International Journal of Advanced Computer Science and Applications (IJACSA)
Abstract
—Digital Video authentication is very important issue in day to day life. A lot of devices have got the ability of recording or capturing digital videos and all these videos can be passed through the internet as well as many other non-secure channels. There is a problem of illegal updating or manipulation of digital video because of the development in video editing software. Therefore, video authentication techniques are required in order to ensure trustworthiness of the video. There are many techniques used to prevent this issue like Digital Signature and Watermarking, these solutions are successfully included in copyright purposes but it's still really difficult to implement in many other situations especially in video surveillance. In this paper, a new method called PLEXUS is proposed for digital video authentication on temporal attacks. In authentication process, the sender will generate a signature according to the method steps using a video and private key. In verification process, the receiver will also generate a signature using the same video and private key then each signature will be compared. If the two signatures are matched then the video is not tampered otherwise the video is tampered. This method is implemented using 10 different videos and proved to be an efficient method.
References (19)
- Sethulekshmi U. S, Remya R. S, Mili Rosline Mathews. "A Survey on Digital Video Authentication Methods." International Journal of Computer Trends and Technology (IJCTT) -volume 22 Number 1- April 2015
- Lo, Chun-Chi, and Yu-Chen Hu. "A novel reversible image authentication scheme for digital images." Signal processing 98 (2014): 174-185.
- Yeswanth.P, Pothumani.s, "Tampering Detection in Digital Videos." International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 3, March 2015.
- Atrey, Pradeep K., Wei-Qi Yan, and Mohan S. Kankanhalli. "A scalable signature scheme for video authentication." Multimedia Tools and Applications 34, no. 1 (2007): 107-135.
- Upadhyay, Saurabh, and Sanjay Kumar Singh. "Video authentication: Issues and challenges." International Journal of Computer Science 9, no. 2012 (2012).
- He, Dajun, Qibin Sun, and Qi Tian. "A secure and robust object-based video authentication system." EURASIP Journal on Advances in Signal Processing 2004, no. 14 (2004): 545469.
- Upadhyay, Saurabh, and Sanjay Kumar Singh. "Video authentication-an overview." International Journal of Computer Science and Engineering Survey 2, no. 4 (2011): 75.
- Christian, Aldrina, and Ravi Sheth. "Secured Digital Video Authentication System." (2017).
- Vartak, Reshma, and Smita Deshmukh. "Survey of Digital Image Authentication Techniques." International Journal of Research in Advent Technology 2, no. 7 (2014): 176-179.
- M. AL-ATHAMNEH, F. KURUGOLLU, D. CROOKES, M. FARID. "Video Authentication Based on Statistical Local Information." 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing.
- Al-Athamneh, Mohammad, Fatih Kurugollu, Danny Crookes, and M. Farid. "Video authentication based on statistical local information." In Utility and Cloud Computing (UCC), 2016 IEEE/ACM 9th International Conference on, pp. 388-391. IEEE, 2016.
- Kroputaponchai, Teerasak, and Nikom Suvonvorn. "Video authentication using spatio-temporal signature for surveillance system." In Computer Science and Software Engineering (JCSSE), 2015 12th International Joint Conference on, pp. 24-29. IEEE, 2015.
- Gupta, Ankita, Shilpi Gupta, and Anu Mehra. "Video authentication in digital forensic." In Futuristic Trends on computational analysis and knowledge management (ABLAZE), 2015 International Conference on, pp. 659-663. IEEE, 2015.
- Komal, A., Shipra Khurana, and Amit Kumar. "Comparative analysis of image quality assessment using HVS model." IJIRCCE 2, no. 7 (2014): 5033-5038.
- Berge, L.A., Dangler, J.R., Doyle, M.S., Liang, T.W. and Orozco, M., International Business Machines Corporation, 2018. TAMPERING DETECTION FOR DIGITAL IMAGES. U.S. Patent Application 15/376,314.
- Sowmya, K. N., H. R. Chennamma, and Lalitha Rangarajan. "Video authentication using spatio temporal relationship for tampering detection." Journal of Information Security and Applications 41 (2018): 159-169.
- Sowmya, K. N., H. R. Chennamma, and Lalitha Rangarajan. "Video authentication using spatio temporal relationship for tampering detection." Journal of Information Security and Applications 41 (2018): 159-169.
- Gusev, Pavel D., and Georgii I. Borzunov. "The Analysis of Modern Methods for Video Authentication." Procedia Computer Science 123 (2018): 161-164.
- Mohsen, Asmaa Hasan, and Shaimaa Hameed Shaker. "Authentication of Digital Video Encryption." Iraqi Journal of Science 57, no. 4C (2016): 2954-2967.