End-to-end secure delivery of scalable video streams
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
Authentication schemes for multimedia streams: Quantitative analysis and comparison
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
Video authentication has gained more and more attention in recent years. However, many existed authentication methods have their obvious drawbacks. In this paper, we propose a novel authentication scheme which can distinguish malicious attack from natural processing with cloud watermark. As videos are often stored and transmitted in compressed format nowadays, we will focus on content authentication of MPEG-2 compressed video. The scheme can also be extended to MPEG-4 video. Our authentication system first separates video sequence into shots and extracts the feature vector from each shot. Then the extracted feature is used to generate watermark cloud drops with a cloud generator. Experimental results show that the proposed approach has a good tamper detection capability even the video is recompressed.