Please use this identifier to cite or link to this item:
DC FieldValue
dc.titleMotion trajectory based video authentication
dc.contributor.authorYan, W.-Q.
dc.contributor.authorKankanhalli, M.S.
dc.identifier.citationYan, W.-Q.,Kankanhalli, M.S. (2003). Motion trajectory based video authentication. Proceedings - IEEE International Symposium on Circuits and Systems 3 : III810-III813. ScholarBank@NUS Repository.
dc.description.abstractWith the relentless digitization of commercial media, it is increasingly susceptible to the violation of its' intellectual property rights. We address the issue of authenticating digital video in this paper by presenting a novel technique based on motion trajectory and cryptographic secret sharing. Given a video, we segment it into shots and select the key frames in a shot based on the motion trajectory. We then consider these key frames as shares of a secret-sharing scheme for color images. We then reconstruct the secret corresponding to these shares. This secret frame is deemed as the secret key of this shot, Utilizing the secret keys of all the shots, we hierarchically construct the master key for the entire video by recursively employing the same method of color image sharing. Any modifications in a shot or in the important content of a shot will be reflected as changes in the computed master key. Thus, any video can be authenticated by comparing its' computed master key with the original master key. The advantages of the proposed technique are that we take the correlation among the video frames into account, all authentication data is encapsulated within the master key, and this master key authentication information need not be embedded into the video, Thus the video quality is not affected by the auxiliary authentication information.
dc.typeConference Paper
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.sourcetitleProceedings - IEEE International Symposium on Circuits and Systems
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.