A Review for Video Authentication and Integrity
Main Article Content
Abstract
In daily life, digital video authentication is a crucial problem. Digital videos may be recorded or captured by many different devices, and these can all be sent through the internet and other unsecured means. Due to the advancement of video editing tools, there is an issue with the editing or changing of digital video without authorization. There are many different methods and techniques, which are suggested for overcoming these problems. Digital video is the fundamental of surveillance system. However, it is easy to be modified by threats that may decrease drastically the trust of surveillance system. The techniques used for video authentication by various authors are discussed in this study.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
ABDULWAHAB, Hala Bahjat; HAMEED, Khaldoun L.; BARNOUTI, Nawaf Hazim. Video Authentication using PLEXUS Method. (ijacsa) International Journal Of Advanced Computer Science And Applications, 2018, 9.11.
I. Echizen, S. Singh, T. Yamada, K. Tanimoto, S. Tezuka, and B. Huet, ''Integrity verification system for video content by using digital watermarking,'' in Proc. Int. Conf. Service Syst. Service Manage., vol. 2, Oct. 2006, pp. 1619-1624.
PARMAR, Zarna; UPADHYAY, Saurabh. A review on video/image authentication and temper detection techniques. International Journal of Computer Applications, 2013, 63.10.
KULKARNI, Ajay, et al. Proposed video encryption algorithm v/s other existing algorithms: A comparative study. arXiv preprint arXiv:1303.3485, 2013.
Kroputaponchai, Teerasak, and Nikom Suvonvorn. "Video authentication using spatio-temporal signature for surveillance system." In Computer Science and Software Engineering (JCSSE), 2015 12th International Joint Conference on, pp. 24-29. IEEE, 2015.
SINGH, Raahat Devender; AGGARWAL, Naveen. Video content authentication techniques: a comprehensive survey. Multimedia Systems, 2018, 24.2: 211-240.
Al-Athamneh, Mohammad, Fatih Kurugollu, Danny Crookes, and M. Farid. "Video authentication based on statistical local information." In Utility and Cloud Computing (UCC), 2016 IEEE/ACM 9th International Conference on, pp. 388-391. IEEE, 2016
. Subramanyam, A. and S. Emmanuel. Video forgery detection using HOG features and compression properties. in Multimedia Signal Processing (MMSP), 2012 IEEE 14th International Workshop on. 2012. IEEE.
Gupta, Ankita, Shilpi Gupta, and Anu Mehra. "Video authentication in digital forensic." In Futuristic Trends on computational analysis and knowledge management (ABLAZE), 2015 International Conference on, pp. 659-663. IEEE, 2015.
MOHSEN, Asmaa Hasan; SHAKER, Shaimaa Hameed. Authentication of Digital Video Encryption. Iraqi Journal of Science, 2016, 2954-2967.
A HASSO, Shahd; B TAHA, Taha. A New Tamper Detection Algorithm For Video. Journal of Engineering Science and Technology (JESTEC), 2020, 15.5: 3375-3387.
Al-Ani, M. S.and Hammouri, T. A. 2011. Video Compression Algorithm Based on Frame Difference Approaches. International Journal on Soft Computing (IJSC), 2(4), pp: 67-79.
KAUR, Jas; KAUR, Jagroop. Hiding Text in Video Using Steganographic Technique-A Review. International Journal of Engineering Sciences, 2016,
SWATHI, A.; JILANI, S. A. K. Video steganography by LSB substitution using different polynomial equations. International Journal of Computational Engineering Research, 2012, 2.5: 1620-1623.
S. Upadhyay and S. K. Singh, "Learning based video authentication using statistical local information," Image Information Processing (ICIIP), 2011 International Conference on, Himachal Pradesh, pp. 1-6 , 2011.
Singh, R.D., Aggarwal, N.: Detection of Re-Compression, Transcoding and Frame-Deletion for Digital Video Authentication. In: Proceedings of 3rd International Conference on Recent Advances in Engineering and Computer Sciences. Chandigarh India
