2013
DOI: 10.1109/tifs.2013.2279542
|View full text |Cite
|
Sign up to set email alerts
|

Authenticating Lossy Surveillance Video

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…A hash generation and signature based scheme is proposed to authenticate each set of videos in the streaming server [11]. In [12] a feature based fingerprint is first generated and then signed, in which security relies on the robustness of the fingerprint. It is necessary to further develop efficient stream level authentication schemes for H.264/AVC to achieve the goals of high authentication possibility and this provides low authentication overhead and high end-to-end quality.…”
Section: Related Workmentioning
confidence: 99%
“…A hash generation and signature based scheme is proposed to authenticate each set of videos in the streaming server [11]. In [12] a feature based fingerprint is first generated and then signed, in which security relies on the robustness of the fingerprint. It is necessary to further develop efficient stream level authentication schemes for H.264/AVC to achieve the goals of high authentication possibility and this provides low authentication overhead and high end-to-end quality.…”
Section: Related Workmentioning
confidence: 99%
“…Note that the proposed preprocessing is universal in the sense that it can be used together with virtually any robust feature extractor in existing video hashing methods. Next, we propose a new robust feature extractor called flow hashing (FH), which tries to blend the frame averaging operation in [4] with HOOF in [6]. Finally, we propose a fusion technique called distance boosting which aims to combine (fuse) the measure given by DTW-based preprocessing and Euclidean distance between FH hashes.…”
Section: Contributions Of This Papermentioning
confidence: 99%
“…Methods of this type extract hash vectors not directly from video frames, but from correlations between nearby frames. One representative method in this type is HOOF [5,6], where Histogram of Orientations of Optical Flow is used to extract hash vectors. Other advances include the use of multiple hash vectors to generate binary hash bits using spectral hashing [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…To generate the authentication code, the authors adopted a vector quantization method to encode textured blocks and a scalar quantization method to encode uniform blocks for each frame. In [31], a combination of robust fingerprinting and cryptographic hashing has been adopted. The proposed video authentication system has been shown to withstand transcoding and transrating operations.…”
Section: Introductionmentioning
confidence: 99%