Open Access Open Access  Restricted Access Subscription or Fee Access

A Review on Video Source Identification

Jagbeer Kaur, Neetika Soni, Himali Sarangal

Abstract


In the advancing world of technology, there is need to explore the video source identification which are wirelessly transferred from a camera and from a one network to another. Wireless cameras come with new concept of video blocking, blurring and security threats like spoofing attacks. Reviewing the existing methods has enlightens the path for an improved algorithm based on sensor pattern matching with wireless signature.


Full Text:

PDF

References


S. Chen, A. Pande, K. Zeng, and P. Mohapatra, “ Live Video Forensics: Source Identification in Lossy Wireless Networks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 28 – 39, January 2015.

M. Chen, J. Fridrich, M. Goljan, and J. Lukáš, “Source digital camcorder identification using sensor photo response non-uniformity,” Proceeding SPIE, Security, Steganography, Watermarking Multimedia Contents IX, vol. 6505, no. 1, pp. 65051G, February. 2007.

F. Lefebvre, B. Chupeau, A. Massoudi, and E. Diehl, “Image and video fingerprinting: Forensic applications,” Proceeding SPIE, Media Forensics Security, vol. 7254, pp. 1–9, February. 2009.

Y. Su, J. Xu, and B. Dong, “A source video identification algorithm based on motion vectors,” In Proceedings 2nd International Workshop Computer Science Engineering, vol. 2, pp. 312–316, October. 2009.

J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” In Proceedings 12th Conference USENIX Security Symposium, 2003, pp. 15–28,2003.

W. van Houten and Z. Geradts, “Source video camera identification for multiply compressed videos originating from YouTube,” Digital Investigation, vol. 6, no. 1–2, pp. 48–60, 2009.

Z. J. Geradts, J. Bijhold, M. Kieft, K. Kurosawa, K. Kuroki, and N. Saitoh, “Methods for identification of images acquired with digital cameras,” In Proceedings SPIE, Enabling Technol. Law Enforcement Security, vol. 4232, pp. 505–512, February. 2001.

M. Kharrazi, H. T. Sencar, and N. Memon, “Blind source camera identification,” in Proc. IEEE Int. Conf. Image Process., Singapore, Oct. 2004, pp. 709–712.

K. S. Choi, E. Y. Lam, and K. K. Y. Wong, “Automatic source camera identification using the intrinsic lens radial distortion,” Opt. Exp., vol. 14, no. 24, pp. 11551–11565, 2006.

W. Van Houten ,Z. Geradts, “Using sensor noise to identify low resolution compressed videos from YouTube” Computational Forensics, Third International Workshop, IWCF 2009; Germany, pp. 104-115, 2009.

J. Lukáš, J. Fridrich, and M. Goljan, “Digital camera identification from sensor pattern noise,” Transactions Information Forensics Security, vol. 1, no. 2,pp. 205–214, June 2006.

K. Zeng, K. Govidan, D. Wu, and P. Mohapatra, “Identity-based attack detection in mobile wireless networks,” in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 1880–1888.

S. Fogie. (2007). Abusing and Misusing Wireless Cameras. [Online].Available:http://www.informit.~com/articles/article.aspx?p=1016099

A. Rocha, W. Scheirer, T. Boult, and S. Goldenstein, “Vision of the unseen: Current trends and challenges in digital image and video forensics,” ACM Computing Surveys, vol. 43, no. 4, pp. 1–42, Oct. 2011.

K. Kurosawa, K. Kuroki, and N. Saitoh, “CCD fingerprint method—Identification of a video camera from videotaped images,” In Proceedings IEEE International Conference Image Processing,, pp. 537–540,1999.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.