Please use this identifier to cite or link to this item:
https://doi.org/10.4018/978-1-60566-262-6.ch016
DC Field | Value | |
---|---|---|
dc.title | Digital video authentication | |
dc.contributor.author | Atrey, P.K. | |
dc.contributor.author | El Saddik, A. | |
dc.contributor.author | Kankanhalli, M. | |
dc.date.accessioned | 2014-07-04T03:16:28Z | |
dc.date.available | 2014-07-04T03:16:28Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Atrey, P.K.,El Saddik, A.,Kankanhalli, M. (2009). Digital video authentication. Handbook of Research on Secure Multimedia Distribution : 298-314. ScholarBank@NUS Repository. <a href="https://doi.org/10.4018/978-1-60566-262-6.ch016" target="_blank">https://doi.org/10.4018/978-1-60566-262-6.ch016</a> | |
dc.identifier.isbn | 9781605662626 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/78454 | |
dc.description.abstract | Digital video authentication has been a topic of immense interest to researchers in the past few years. Authentication of a digital video refers to the process of determining that the video taken is original and has not been tampered with. This chapter aims to provide an overview of digital video authentication systems and a universal review of the associated methods. The chapter not only establishes the importance of authenticating a video in various application scenarios; it also identifies key properties and design issues that should be considered while designing a video authentication system. The benign and tampering operations that characterize the security and robustness aspects of a typical video authentication system are described. The past works related to video authentication, based on digital signature and digital watermarking, have been described; and the emerging trends in this area of research have also been identified. © 2009, IGI Global. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.4018/978-1-60566-262-6.ch016 | |
dc.source | Scopus | |
dc.type | Others | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.4018/978-1-60566-262-6.ch016 | |
dc.description.sourcetitle | Handbook of Research on Secure Multimedia Distribution | |
dc.description.page | 298-314 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.