Survey: Video Authentication and Tampring Attacks

Authors

  • Ankit N. Patel Department of Information Technology (System and Network Security), Sardar Vallabhbhai Institute of Technology, Vasad, Gujarat, India388306
  • Prof. Swati D. Bendale Department of Information Technology (System and Network Security), Sardar Vallabhbhai Institute of Technology, Vasad, Gujarat, India388306

Keywords:

Video Authentication, Watermarking, Digital Signature, Intelligent Techniques, Forgery Attacks.

Abstract

In recent years, development in sophisticated video editing technology and wide use of video in our society, it
is becoming important to assure the trustworthiness of video. Therefore in court of law, surveillance and other fields
video content must be secured against tampering or alteration so video authentication is required. Video authentication
means to check the trustworthiness of the video by verifying the integrity and source of video data. There are three main
techniques of video authentication: Digital signature, Watermarking and Intelligent technique. In this paper we present
a brief detail of these video authentication techniques, why video authentication is required and video forgery. We also
give the advantages and disadvantages of these techniques

Published

2017-04-25

How to Cite

Ankit N. Patel, & Prof. Swati D. Bendale. (2017). Survey: Video Authentication and Tampring Attacks. International Journal of Advance Research in Engineering, Science & Technology, 4(4), 183–188. Retrieved from https://ijarest.org/index.php/ijarest/article/view/1058