A Survey on Digital Video Authentication Methods

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-22 Number-1
Year of Publication : 2015
Authors : Sethulekshmi U. S, Remya R. S, Mili Rosline Mathews


Sethulekshmi U. S, Remya R. S, Mili Rosline Mathews "A Survey on Digital Video Authentication Methods". International Journal of Computer Trends and Technology (IJCTT) V22(1):35-40, April 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
With the innovations and development in sophisticated video editing technology and the wide spread use of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. In surveillance, forensics, medical and various other fields, video contents must be protected against attempt of manipulation. Such malicious alterations could affect the decisions made based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information. In this paper we are making a survey of some of the recent passive methods for video tampering detection in the literature proposed so far and critically reviewing them by listing the strengths and weaknesses of each of them.

[1] Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin, Chiou-Ting Hsu, ―Video forgery detection using correlation of noise residue in Proc.IEEE, 2008, pp.170-174
[2] Weihong Wang, Hany Farid, ―Exposing Digital Forgeries in Video by Detecting Duplication, in Proc.IEEE 2007
[3] Qiong Dong, Gaobo Yang, Ningbo Zhu, ―A MCEA based passive forensics scheme for detecting frame based video tampering, Elsevier, 2012, vol.9, pp.151-159
[4] Weihong Wang, Hany Farid, ―Exposing video forgeries by detecting MPEG double compression IEEE,2012
[5] Richao chen, Qiong Dong, Heng Ren and Jiaqi Fu, ―Video Forgery detection Based on Non-Subsampled Contourlet Transform and Gradient Information, Information technology Journal 11(10), 2012, pp.1456-1462
[6] Guo-Shiang Lin, Jie-Fan Chang and Cheng-Hung Chuang, ―Detecting Frame Duplication Based on Spatial and Temporal Analysis, 6 th International Conference on Computer Science and Education (ICCSE 2011) , 2011
[7] Paolo Bestagini, Simone Milani, Marco Tangliasacchi, Stefano Tubaro, ―Local Tampering detection in video sequences, Proc.Multimedia Signal Processing (MMSP), IEEE 15th International Workshop, 2013, pp.488-493
[8] A. Gironi, M. Fontani, T. Bianchi, A. Piva, M. Barni,A video forensic technique for detecting frame deletion and insertion, in Acoustics, Speech and Signal Processing(ICASSP), 2014 IEEE International Conference, pp.6226-623 0
[9] D. Labartino, T. Bianchi, A. De Rosa, M. Fontani, A.Piva, M. Barni, ―Localization of Forgeries in MPEG-2 Video through GOP size and DQ Analysis, IEEE, 2013, pp.494-499
[10] P. Bestagini, S. Battaglia, S. Milani, M. Tagliasacchi, S. Tubaro, ―Detection of temporal interpolation in video sequences, Proc. IEEE, 2013, pp. 3033-3037
[11] Xinghao Jiang, Wan Wang, Tanfeng Sun, Yun Q. Shi, Fellow IEEE, and Shilin Wang, ―Detection of Double Compression in MPEG-4 Videos Based on Markov Statistics, IEEE Journals and Magazines, 2013, vol. 20, pp. 447- 450
[12] Richao Chen, Qiong Dong, Heng Ren and Jiaqi Fu, ―Video forgery detection based on non-subsampled contourlet transform and gradient information in Information Technology Journal, 2012
[13] Wan Wang, Xinghao Jiang, Shilin wang, Meng Wan and Tanfeng Sun, ― Identifying Video Forgery Process Using Optical Flow‖, Springer, 2014,pp. 224-257
[14] Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong Ma, ―Video Interframe Forgery Identification Based on Optical Flow Consistency‖, Springer, 2014, vol.166, pp. 229-234
[15] Jean- Yves Bouguet, ―Pyramidal Implementation of the Lucas Kanade Feature Tracker Description of the algorithm
[16] Juan Chao, Xinghao Jiang and Tanfeng Sun, ―A Novel Video Interframe Forgery Model Detection Scheme Based on Optical Flow Consistency, Digital Forensics and Watermarking, Lecture Notes in Computer Science, Springer, Berlin Heidelberg, Vol. 7809, 2013, pp. 267-281
[17] Saurabh Upadhyay, Sanjay Kumar Singh, ―Video Authentication- An Overview
[18] Dawen Xu, Rangding Wang, and Yun Q. Shi, Fellow IEEE, ― Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution‖, IEEE Transactions on Information Forensics and Security, Vol. 9, no. 4, April 2014
[19] Mehdi Fallahpour, Shervin Shirmohammadi, Senior member IEEE, Mehdi Semsarzadeh, and Jiying Zhao, Member, IEEE, ―Tampeing Detection in Compressed Digital Video Using Watermarking, IEEE Transactions on Instrumentation and measurements, 2009
[20] Prof Ashok De, Himanshu Chandha, Sparsh Gupta, ―Detection of Forgery in Digital Video
[21] Ho Hee- Meng, ―Digital Video Forensics: Detecting MPEG-2 Video tampering through Motion Errors
[22] John Wiseman, ―An Introduction to MPEG Video Compression

Digital video, Surveillance, Forensics, Video Tampering, Video Authentication