Image Authentication Techniques
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
21-09-2008, 10:21 AM


Introduction

This paper explores the various techniques used to authenticate the visual data recorded by the automatic video surveillance system. Automatic video surveillance systems are used for continuous and effective monitoring and reliable control of remote and dangerous sites. Some practical issues must be taken in to account, in order to take full advantage of the potentiality of VS system. The validity of visual data acquired, processed and possibly stored by the VS system, as a proof in front of a court of law is one of such issues. But visual data can be modified using sophisticated processing tools without leaving any visible trace of the modification.

So digital or image data have no value as legal proof, since doubt would always exist that they had been intentionally tampered with to incriminate or exculpate the defendant. Besides, the video data can be created artificially by computerized techniques such as morphing. Therefore the true origin of the data must be indicated to use them as legal proof. By data authentication we mean here a procedure capable of ensuring that data have not been tampered with and of indicating their true origin.

Automatic Visual Surveillance System

Automatic Visual Surveillance system is a self monitoring system which consists of a video camera unit, central unit and transmission networks A pool of digital cameras is in charge of frame the scene of interest and sent corresponding video sequence to central unit. The central unit is in charge of analyzing the sequence and generating an alarm whenever a suspicious situation is detected.

Central unit also transmits the video sequences to an intervention centre such as security service provider, the police department or a security guard unit. Somewhere in the system the video sequence or some part of it may be stored and when needed the stored sequence can be used as a proof in front of court of law. If the stored digital video sequences have to be legally credible, some means must be envisaged to detect content tampering and reliably trace back to the data origin

Authentication Techniques

Authentication techniques are performed on visual data to indicate that the data is not a forgery; they should not damage visual quality of the video data. At the same time, these techniques must indicate the malicious modifications include removal or insertion of certain frames, change of faces of individual, time and background etc. Only a properly authenticated video data has got the value as legal proof. There are two major techniques for authenticating video data.

They are as follows

1. Cryptographic Data Authentication

It is a straight forward way to provide video authentication, namely through the joint use of asymmetric key encryption and the digital Hash function.

Cameras calculate a digital summary (digest) of the video by means of hash function. Then they encrypt the digest with their private key, thus obtaining a signed digest which is transmitted to the central unit together with acquired sequences. This digest is used to prove data integrity or to trace back to their origin. Signed digest can only read by using public key of the camera.

2. Watermarking- based authentication

Watermarking data authentication is the modern approach to authenticate visual data by imperceptibly embedding a digital watermark signal on the data.

Digital watermarking is the art and science of embedding copyright information in the original files. The information embedded is called 'watermarks '. Digital watermarks are difficult to remove without noticeably degrading the content and are a covert means in situation where copyright fails to provide robustness.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
Harshadingle
Active In SP
**

Posts: 2
Joined: Aug 2010
#2
11-08-2010, 05:48 PM

i want ppt for image authentication technique
Reply
seminar ideas
Super Moderator
******

Posts: 10,003
Joined: Apr 2012
#3
20-06-2012, 10:17 AM

hi you can see these pages to get the details on IMAGE AUTHENTICATION TECHNIQUES

topicideashow-to-image-authentication-techniques--8262

topicideashow-to-virtual-reality-full-report
seminar and presentationproject and implimentationsattachment.php?aid=12071

topicideashow-to-image-authentication-techniques-seminar and presentation-report
Reply
Guest
Thinking To Register

 
#4
22-08-2013, 08:16 PM

can i get matlab code for any such project and implimentations in this site?? u provide code along with the info ??
Reply
study tips
Super Moderator
******

Posts: 10,180
Joined: Feb 2013
#5
23-08-2013, 09:29 AM

To get full information or details of Image Authentication Techniques please have a look on the pages

topicideashow-to-image-authentication-techniques-seminar and presentation-report

topicideashow-to-image-authentication-techniques-ppt?pid=160117#pid160117

topicideashow-to-image-authentication-techniques--8262?pid=162353#pid162353

topicideashow-to-image-authentication-techniques-ppt?pid=160117#pid160117

topicideashow-to-image-authentication-techniques-ppt?page=2

topicideashow-to-image-authentication-techniques

if you again feel trouble on Image Authentication Techniques please reply in that page and ask specific fields in Image Authentication Techniques
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  eye movement based human computer interaction techniques ppt jaseelati 0 358 20-12-2014, 04:23 PM
Last Post: jaseelati
  Signal Encoding Techniques PPT project girl 2 646 10-08-2014, 03:39 PM
Last Post: joyhancj
  Low Memory Color Image Zero Tree Coding computer science crazy 3 3,553 07-03-2014, 04:30 PM
Last Post: seminar project topic
  PULSE WIDTH MODULATION TECHNIQUES FOR VOLTAGE –FED INVERTERS PPT seminar projects maker 0 836 24-09-2013, 04:41 PM
Last Post: seminar projects maker
  FPGA Implementation of Intelligent Systems for Virus Image Recognitions PPT seminar projects maker 0 503 20-09-2013, 03:02 PM
Last Post: seminar projects maker
  Switching Techniques PPT study tips 0 408 24-08-2013, 03:54 PM
Last Post: study tips
  EIGEN VALUE TECHNIQUES FOR SMALL SIGNAL STABILITY ANALYSIS IN POWER SYSTEM pdf study tips 0 704 28-06-2013, 03:21 PM
Last Post: study tips
  Hard switching and Soft Switching Techniques study tips 0 326 21-05-2013, 11:49 AM
Last Post: study tips
  REPORT ON IMAGE COMPRESSION FUNDAMENTALS study tips 0 292 15-05-2013, 11:33 AM
Last Post: study tips
Sad TRANSIENT OVER VOLTAGES IN ELECTRICAL DISTRIBUTION SYSTEM AND SUPPRESSION TECHNIQUES seminar projects crazy 1 4,101 16-03-2013, 01:49 AM
Last Post: Guest