Please use this identifier to cite or link to this item:
|Title:||An authentication mechanism using Chinese remainder theorem for efficient surveillance video transmission||Authors:||Thomas, T.
|Issue Date:||2010||Citation:||Thomas, T.,Emmanuel, S.,Zhang, P.,Kankanhalli, M.S. (2010). An authentication mechanism using Chinese remainder theorem for efficient surveillance video transmission. Proceedings - IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2010 : 567-573. ScholarBank@NUS Repository. https://doi.org/10.1109/AVSS.2010.13||Abstract:||Now-a-days, surveillance cameras have been widely deployed in various security applications. In many surveillance applications, the background changes very slowly and the foreground objects occupy only a relatively small portion of a video frame. In these type of applications, an efficient solution for transmissions over bandwidth-limited networks is to send only the foreground objects for every frame in real time while the background is sent occasionally. At the receiving end of the transmission, the objects and the most recent background can be fused together and the original frame can be reconstructed. However, protecting the authenticity of the video becomes more challenging in this case as a malicious entity can modify/replace/remove the individual foreground objects and background in the video. In this paper, we propose a Chinese remainder theorem based watermarking mechanism for protecting the authenticity of videos transmitted or stored as objects and background. Our mechanism ensures the authenticity between video objects and their associated background. © 2010 IEEE.||Source Title:||Proceedings - IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2010||URI:||http://scholarbank.nus.edu.sg/handle/10635/40095||ISBN:||9780769542645||DOI:||10.1109/AVSS.2010.13|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on May 15, 2019
checked on May 18, 2019
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.