Authentication Techniques for Videos and Images

Rajiv, Mohan David (2009) Authentication Techniques for Videos and Images. In: 3rd National Conference on Advances in Energy Conversion Technologies, April 3-4, 2009, Manipal Institute of Technology.

[img] PDF
aect-conf-rajiv.pdf - Published Version
Restricted to Registered users only

Download (151kB) | Request a copy


This paper explores the various techniques used to authenticate the visual data. Automatic video surveillance systems are used for continuous and effective monitoring and reliable control of remote and dangerous sites. Some practical issues must be taken in to account, in order to take full advantage of the potentiality of VS system. The validity of visual data acquired, processed and possibly stored by the VS system, as a proof in front of a court of law is one of such issues. But visual data can be modified using sophisticated processing tools without leaving any visible trace of the modification. So digital or image data have no value as legal proof, since doubt would always exist that they had been intentionally tampered with to incriminate or exculpate the defendant. Besides, the video data can be created artificially by computerized techniques such as morphing. Therefore the true origin of the data must be indicated to use them as legal proof. By data authentication we mean here a procedure capable of ensuring that data have not been tampered with and of indicating their true origin.

Item Type: Conference or Workshop Item (Paper)
Subjects: Engineering > MIT Manipal > Electronics and Communication
Depositing User: Users 76 not found.
Date Deposited: 23 Jul 2011 04:25
Last Modified: 08 Mar 2012 04:21

Actions (login required)

View Item View Item