Call for Paper - December 2019 Edition
IJCA solicits original research papers for the December 2019 Edition. Last date of manuscript submission is November 20, 2019. Read More

Digital Signature Schemes for Secure Video

Print
PDF
IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)
© 2012 by IJCA Journal
ncipet - Number 4
Year of Publication: 2012
Authors:
R. N. Mandavgane
N.G.Bawane

R N Mandavgane and N.G.Bawane. Article: Digital Signatura Schemes for Secure Video. IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012) ncipet(4):1-4, March 2012. Full text available. BibTeX

@article{key:article,
	author = {R. N. Mandavgane and N.G.Bawane},
	title = {Article: Digital Signatura Schemes for Secure Video},
	journal = {IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)},
	year = {2012},
	volume = {ncipet},
	number = {4},
	pages = {1-4},
	month = {March},
	note = {Full text available}
}

Abstract

Wireless multimedia delivery is becoming increasingly important in today's networks. Due to the explosive growth of the Internet and increasing demand for multimedia information on the web, streaming video over wireless networks has received tremendous attention from academia and industry. Data origin and data integrity authentication are very important factors in video security. Extensive research has been conducted in this area with different techniques. In this paper, digital signature techniques are reviewed for authenticating video.

References

  • Jean Jacques Quisquater, Marc Joye, “Authentication of Sequences with the SL2 Hash Function: Application to Video sequences”, Published in Journal of Computer Security , pp 213-223, !997.
  • J.J Quisquater, B. Marq, M. Joye and A. Bernard, “ Practical Solution to Authentication of Images With A secure Camera”, Published in I.K.Sethi and R.C. Jain, Eds., Storage and retrieval for Image and video Databases V, Vol. 3022 of Proc.SPIE pp. 290-197, SPIE, 1997.
  • Ching-yung lin andshia-fu chang, “Issues and Solutions for Authenticating MPEG Video”, IEEE International conference on Acoustics, Speech and Signal processing, vol. 3657 pp 54-65, April1999. [4 ]Jana Dittmann, Arnd Steinmetz, Ralf Steinmetz, “ Content based digital Signature for Motion picture Authentication and Content Fragile Watermarking” In IEEE international conference on multimedia computing and systems, vol. 2, pp 209-213, 1999
  • Chih Husan Tzeng and Wen Hsiang Tsai, “A New Technique for Authentication of Image/Video for Multimedia Applications”, In Multimedia and security workshop at ACM multimedia, Ottawa ,Canada, pp 23-26, 2001
  • Wei Qi Yan and Mohan Kankanhalli, “Motion Trajectory Based Video Authentication”, IEEE ISCAS, Bangkok, vol. 3, pp 810-813, 2003
  • Pradeep K. Atrey , Wei Qi Yan and Mohan S. Kankanhalli , “A scalable signature scheme for video authentication,” Multimedia Tools Appl.,vol 34, pp 107-135, July 2007.
  • Pradeep K. Atrey , Wei Qi Yan and Mohan S. Kankanhalli , “ A Hierarchical Signature Scheme for Robust Video Authentication using secret sharing”, In International Multimedia Modeling conference, Brisbane ,Australia, pp 330-337. 2004
  • Ee-Chien Chang, Mohan S. Kankanhalli, Xin Guan, Zhiyong huang, yinghui Wu, “ Robust Image Authentication using Content Based compression”, In Multimedia Systems,Springer-Verlog 2003
  • Marc Schneider and Shih-Fu-Chang, “A Robust Content based Digital Signature for Image Authentication”, IEEE Internatinal conference on Image Processing, Lausanne, Switzerland, pp. 227-230, 1996.
  • Ching-Yung Lin And Shih-Fu Chang, “Generating Robust Digital Signature for Image/Video Authentication”, In Multimedia and Security Workshop at ACM Multimedia 98, Bristol U.K. September 1998.
  • J. F. Canny, “A Computational approach to edge detection” IEEE Trans. On Pattern analysis and machine intelligence. Vol. PAMI-8, Nov. 1986.