2020 5th International Conference on Computing, Communication and Security (ICCCS) 2020
DOI: 10.1109/icccs49678.2020.9277177
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Malicious Video Modifications using Perceptual Video Hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…A reverse method is used for extraction, and the secret data is acquired by analyzing the video. The video fingerprint is obtained by utilizing the 3D-RPT and the 2D-DCT (12) for detecting malicious video attacks. The suggested method is driven by key frame video hashing and 3D-RPT video hashing.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A reverse method is used for extraction, and the secret data is acquired by analyzing the video. The video fingerprint is obtained by utilizing the 3D-RPT and the 2D-DCT (12) for detecting malicious video attacks. The suggested method is driven by key frame video hashing and 3D-RPT video hashing.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The perceptual hashing approach generates a fixed-length fingerprint, i.e., a hash code based on the perceptual content of the image/video/audio. In the last few years, perceptual hashing has been used in different applications such as tampering detection [15], person re-identification [7], victim identification [4], or illegal Tor domain classification [5].…”
Section: Perceptual Hashingmentioning
confidence: 99%
“…Sandeep and Prabin [15] proposed a video hashing method to detect malicious video modifications using the three-dimensional radial projection technique and the two-dimensional discrete cosine transform. Fang et al [7] proposed a multi-statistics on hash feature map descriptor for person re-identification using binarized low-level color and gradient feature maps obtained with perceptual hashing, and regional statistics computed over an image pyramid.…”
Section: Perceptual Hashingmentioning
confidence: 99%