Image Authentication Techniques


This  Electronics Engineering Seminar Topic deals with the following:

This paper explores the various techniques used to authenticate the visual data recorded by the automatic video surveillance system. Automatic video surveillance systems are used for continuous and effective monitoring and reliable control of remote and dangerous sites. Some practical issues must be taken in to account, in order to take full advantage of the potentiality of VS system. The validity of visual data acquired, processed and possibly stored by the VS system, as a proof in front of a court of law is one of such issues.  But visual data can be modified using sophisticated processing tools without leaving any visible trace of the modification. So digital or image data have no value as legal proof, since doubt would always exist that they had been intentionally tampered with to incriminate or exculpate the defendant. Besides, the video data can be created artificially by computerized techniques such as morphing. Therefore the true origin of the data must be indicated to use them as legal proof. By data authentication we mean here a procedure capable of ensuring that data have not been tampered with and of indicating their true origin.

A pool of digital cameras is in charge of frame the scene of interest and sent corresponding video sequence to central unit. The central unit is in charge of analyzing the sequence and generating an alarm whenever a suspicious situation is detected. Central unit also transmits the video sequences to an intervention centre such as security service provider, the police department or a security guard unit. Somewhere in the system the video sequence or some part of it may be stored and when needed the stored sequence can be used as a proof in front of court of law. If the stored digital video sequences have to be legally credible, some means must be envisaged to detect content tampering and reliably trace back to the data origin.

3. AUTHENTICATION TECHNIQUES
Authentication techniques are performed on visual data to indicate that the data is not a forgery; they should not damage visual quality of the video data. At the same time, these techniques must indicate the malicious modifications include removal or insertion of certain frames, change of faces of individual, time and background etc. Only a properly authenticated video data has got the value as legal proof. There are two major techniques for authenticating video data. They are as follows

1. Cryptographic Data Authentication
It is a straight forward way to provide video authentication, namely through the joint use of asymmetric key encryption and the digital Hash function.

Cameras calculate a digital summary (digest) of the video by means of hash function. Then they encrypt the digest with their private key, thus obtaining a signed digest which is transmitted to the central unit together with acquired sequences. This digest is used to prove data integrity or to trace back to their origin. Signed digest can only read by using public key of the camera.

2.   Watermarking- based authentication
Watermarking data authentication is the modern approach to authenticate visual data by imperceptibly embedding a digital watermark signal on the data.

Digital watermarking is the art and science of embedding copyright   information in the original files. The information embedded is called ‘watermarks ‘. Digital watermarks are difficult to remove without noticeably degrading the content and are a covert means in situation where copyright fails to provide robustness.

Click Here To Download Full Seminar

Related Posts:

You may also like

27 Comments

  • mukesh kumar
    September 6, 2009 at 9:53 pm

    I need more materials on this topic.

  • Pavithra
    November 13, 2009 at 9:28 am

    Can please forward me all materials on
    1. Image Authentication Techniques
    2. Digital watermarking

  • sravan
    January 11, 2010 at 8:11 am

    can u please forward me information about ec2 technology

  • sravan
    January 11, 2010 at 8:14 am

    can you provide the details about EC2 technology

  • smitha
    February 18, 2010 at 12:49 am

    i’m unable to download it please make it available

  • kumar
    February 28, 2010 at 9:24 pm

    plz forward more matireals on this topic..

  • sonu kumar
    April 12, 2010 at 2:02 am

    ples. send me ppt file on image authantication technique or stealth technology

  • sree
    July 17, 2010 at 12:26 am

    please give me more details about the topic

  • bandita
    July 21, 2010 at 10:41 pm

    can u plz send me more materials and ppt presentaton on this topic

  • ritm
    August 12, 2010 at 8:02 am

    many thanks for the upload…………but form page no.16 to 19 we can’t see properly.

    I request you to look at the file and please upload it.

  • NAVEEN
    December 11, 2010 at 8:18 am

    I NEED PPT FOR THIS TOPIC

  • santosh k
    January 2, 2011 at 12:26 am

    please send me more details on this topic

  • naveen
    January 4, 2011 at 2:52 am

    i need ppt on this topic

  • pradeep
    February 3, 2011 at 12:12 am

    i need ppt on “methods and systems for graphical image authentication”. so plz send me.

  • SADAK
    February 11, 2011 at 8:02 pm

    sadak image AUTHENTICATION TECHNIQUES ppt sen to my id

  • ravi
    March 23, 2011 at 8:14 pm

    i need ppt on image authentication techniques

  • shashikala
    May 3, 2011 at 12:42 am

    can u plz send me the mems switches and vlsi computations ppt.

  • arun
    June 15, 2011 at 12:35 am

    i need info about image processing

  • aakriti
    August 31, 2011 at 9:55 am

    I NEED PPT ON THIS SUBJECT

  • rani
    January 29, 2012 at 9:56 pm

    i need ppt on this topic.

  • rani
    January 29, 2012 at 11:05 pm

    i need ppt on this topic

  • Chethana
    March 25, 2012 at 11:58 pm

    i need abstract of image authentication techniques

  • sravanthi
    July 14, 2012 at 12:17 am

    can u send me ppt on this topic

  • Sneha
    August 6, 2012 at 1:13 am

    plz send me ppt of image authentication techniques and all the related material of image authentication techniques

  • Shri
    August 11, 2012 at 4:13 am

    Hello Friend .. Can you send me ppt on “Image Authentication Techniques” plz…

  • basavaraj g
    October 11, 2012 at 9:26 pm

    can u send me seminor topics

LEAVE A COMMENT

Get Seminars to Your Mail

Enter your email address:

Delivered by FeedBurner

Like Us in Facebook

Mechanical Seminar Topics