Image authentication techniques for surveillance applications

被引:86
作者
Bartolini, F
Tefas, A
Barni, M
Pitas, I
机构
[1] Univ Siena, Dept Informat Engn, I-53100 Siena, Italy
[2] Univ Florence, Dept Elect & Telecommun, I-50139 Florence, Italy
[3] Univ Thessaloniki, Dept Informat, GR-54006 Thessaloniki, Greece
关键词
automatic video surveillance; video authentication; watermarking;
D O I
10.1109/5.959338
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 [电气工程]; 0809 [电子科学与技术];
摘要
In automatic video surveillance (VS) systems, the issue of authenticating the video content is of primary importance. Given the ease with which digital images and videos can be manipulated, practically they do not have any value as legal proofs, if the possibility of authenticating their content is not provided. In this paper the problem of authenticating video surveillance image sequences is considered. After an introduction motivating the need for a watermarking-based authentication of VS sequences, a brief survey of the main watermarking-based authentication techniques is presented and the requirements that an authentication algorithm should satisfy for VS applications are discussed. A novel algorithm which is suitable for VS visual data authentication is also presented and the results obtained by applying it to test data are discussed.
引用
收藏
页码:1403 / 1418
页数:16
相关论文
共 57 条
[1]
And JF, 1999, INT C IM PROC
[2]
Capacity of full frame DCT image watermarks [J].
Barni, M ;
Bartolini, F ;
De Rosa, A ;
Piva, A .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (08) :1450-1455
[3]
BARNI M, 2000, P EUSIPCO00 19 EUR S
[4]
BARNI M, 1999, P ICMCS99 INT C MULT, V2, P199
[5]
BARNI M, 2000, EUSIPCO00 10 EUR SIG
[6]
Bender W., 1995, Proceedings of the SPIE - The International Society for Optical Engineering, V2420, P164, DOI 10.1117/12.205315
[7]
Bhattacharjee S, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P435, DOI 10.1109/ICIP.1998.723518
[8]
RECOVERY OF MOVING OBJECT MASKS IN AN IMAGE SEQUENCE USING LOCAL SPATIOTEMPORAL CONTEXTUAL INFORMATION [J].
BOUTHEMY, P ;
LALANDE, P .
OPTICAL ENGINEERING, 1993, 32 (06) :1205-1212
[9]
COX IJ, 1995, 9510 NEC RES I
[10]
Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586