Integrating Content Authentication Support in Media Services
2018, Encyclopedia of Information Science and Technology, Fourth Edition
https://doi.org/10.4018/978-1-5225-2255-3.CH254…
3 pages
1 file
Sign up for access to the world's latest research
Abstract
The present chapter investigates content authentication strategies and their use in media practice. Remarkable research progress has been conducted on media veracity methods and algorithms, however, without providing that much straightforward tools to users involved in real-world applications. Hence, there is an urgent need for further supporting content verification by exploiting all the available methods in properly integrated online environments, forming a Media Authentication Network. On-demand training (and feedback) on these technologies is considered of major importance, enabling users to collaborate with media and forgery experts towards adoption, refinement and widespread dissemination of best practices. Better comprehension of the involved tools and algorithms would propel their broad exploitation in practice, gaining valuable feedback for further improvements. Thus, a continuously updated online repository, containing documented examples, learning resources and media vera...
Related papers
International Journal of Information Security, 2007
With today's global digital environment, the Internet is readily accessible anytime from everywhere, so does the digital image manipulation software; thus, digital data is easy to be tampered without notice. Under this circumstance, integrity verification has become an important issue in the digital world. The aim of this paper is to present an in-depth review and analysis on the methods of detecting image tampering. We introduce the notion of content-based image authentication and the features required to design an effective authentication scheme. We review major algorithms and frequently used security mechanisms found in the open literature. We also analyze and discuss the performance tradeoffs and related security issues among existing technologies.
2015
MAVEN (Management and Authenticity Verification of multimedia contENts) is a European FP7 Project focused on the development of a suite of tools for multimedia data management and security. MAVEN objectives are centered on two key concepts, search and verify, integrated in a coherent manner: the system first searches for digital contents containing objects of interest and then applies advanced forensic analysis tools to verify their integrity and authenticity. These capabilities have been developed as a single software framework, and the project also involves the implementation of a prototype demonstrator application, which brings to the end user the possibility of searching for specific contents in media while verifying their authenticity.
2019
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
International Journal of Computer Science & Engineering Survey, 2011
With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are broadly classified into four categories: digital signature based techniques, watermark based techniques, intelligent techniques and other techniques. Furthermore we give the shortcomings of different categories of video authentication techniques in brief.
We present a multimedia content delivery system that preserves the end-to-end authenticity of original content while allowing content adaptation by intermediaries. Our system utilizes a novel multi-hop signature scheme using Merkle trees that permits selective element removal and insertion. To permit secure element insertion we introduce the notion of a placeholder. We propose a computationally efficient scheme to instantiate placeholders based on the hash-sign-switch paradigm using trapdoor hash functions. We developed a system prototype in which the proposed signature scheme is implemented as an extension of the W3C XML signature standard and is applied to content meta-data written in XML. Evaluation results show that the proposed scheme improves scalability and response time of protected adaptive content delivery systems by reducing computational overhead for intermediaries to commit to the inserted element by 95% compared to schemes that use conventional digital signatures.
Research Developments in Biometrics and Video Processing Techniques
With the growing innovations and emerging developments in sophisticated video editing technology, it is becoming highly desirable to assure the credibility and integrity of video information. Today digital videos are also increasingly transmitted over non-secure channels such as the Internet. Therefore, in surveillance, medical, and various other fields, video contents must be protected against attempts to manipulate them. Video authentication has gained much attention in recent years. However, many existing authentication techniques have their own advantages and obvious drawbacks. The authors propose a novel authentication technique that uses an intelligent approach for video authentication. This chapter presents an intelligent video authentication algorithm for raw videos using a support vector machine, which is a non-linear classifier, and its applications. It covers both kinds of tampering attacks, spatial and temporal. It uses a database of more than 2000 tampered and non-tampe...
Future Internet, 2022
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
ACM Transactions on Multimedia Computing, Communications, and Applications, 2009
Compared with the direct server-user approach, the server-proxy-user architecture for multimedia delivery promises significantly improved system scalability. The introduction of the intermediary transcoding proxies between content servers and end users in this architecture, however, brings unprecedented challenges to content security. In this article, we present a systematic study on the end-to-end content authentication problem in the server-proxy-user context, where intermediary proxies transcode multimedia content dynamically. We present a formal model for the authentication problem, propose a concrete construction for authenticating generic data modality and formally prove its security. We then apply the generic construction to authenticating specific multimedia formats, for example, JPEG2000 code-streams and MPEG-4 video streams. The prototype implementation shows that our scheme is suitable for practical applications.
Proceedings 11th International Conference on Image Analysis and Processing
In this paper we propose a taxonomy for image authentication techniques that takes into account three different features: the level of integrity ver$cation, the approach to the generation of the authenticator and the capability of localizing manipulated areas. The goal is to revise the current and very heterogeneous bibliography on this topic, and to define a set of basic requirements for an authentication service, in order to identify which ones have already been met and which ones remain challenging. The major algorithms proposed in the last decade are examined according to the classification criteria; advantages and drawbacks of the possible approaches are reported. In particular we investigate the relationship between the well established digital signature techniques and the emerging watermarking approaches. As a result, we propose a methodological approach to the design of robust, secure and eficient authentication algorithms.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.