Live Video Forensics: Source Identification in Lossy Wireless Networks. Chen, S, Pande, A, Zeng, K, & Mohapatra, P IEEE Transactions on Information Forensics and Security, to appear. abstract bibtex Video source identification is very important in validating video evidence, tracking down video piracy crimes and regulating individual video sources. With the prevalence of wireless communication, wireless video cameras continue to replace their wired counterparts in security / surveillance systems and tactical networks. However, wirelessly streamed videos usually suffer from blocking and blurring due to inevitable packet loss in wireless transmissions. The existing source identification methods experience significant performance degradation or even fail to work when identifying videos with blocking and blurring. In this paper, we propose a method which is effective and efficient in identifying such wirelessly streamed videos. In addition, we also propose to incorporate wireless channel signatures and selective frame processing into source identification, which significantly improve the identification speed.
@article{ chenvideoTIFS,
journal = {IEEE Transactions on Information Forensics and Security},
author = {S Chen and A Pande and K Zeng and P Mohapatra},
title = { Live Video Forensics: Source Identification in Lossy Wireless Networks },
year = {to appear},
pages = {215-219},
abstract = {Video source identification is very important in validating video evidence,
tracking down video piracy crimes and regulating individual video sources. With the prevalence of wireless communication,
wireless video cameras continue to replace their wired counterparts in security / surveillance systems and tactical networks.
However, wirelessly streamed videos usually suffer from blocking and blurring due to inevitable packet loss in wireless
transmissions. The existing source identification methods experience significant performance degradation or even fail to work
when identifying videos with blocking and blurring. In this paper, we propose a method which is effective and efficient
in identifying such wirelessly streamed videos. In addition, we also propose to incorporate wireless channel signatures
and selective frame processing into source identification, which significantly improve the identification speed.},
keywords = {SecurityPrivacyandTrust,WirelessNetworks}
}
Downloads: 0
{"_id":"AZ7aTJvwxYRWTKwBn","authorIDs":[],"author_short":["Chen, S","Pande, A","Zeng, K","Mohapatra, P"],"bibbaseid":"chen-pande-zeng-mohapatra-livevideoforensicssourceidentificationinlossywirelessnetworks-toappear","bibdata":{"abstract":"Video source identification is very important in validating video evidence, tracking down video piracy crimes and regulating individual video sources. With the prevalence of wireless communication, wireless video cameras continue to replace their wired counterparts in security / surveillance systems and tactical networks. However, wirelessly streamed videos usually suffer from blocking and blurring due to inevitable packet loss in wireless transmissions. The existing source identification methods experience significant performance degradation or even fail to work when identifying videos with blocking and blurring. In this paper, we propose a method which is effective and efficient in identifying such wirelessly streamed videos. In addition, we also propose to incorporate wireless channel signatures and selective frame processing into source identification, which significantly improve the identification speed.","author":["Chen, S","Pande, A","Zeng, K","Mohapatra, P"],"author_short":["Chen, S","Pande, A","Zeng, K","Mohapatra, P"],"bibtex":"@article{ chenvideoTIFS,\n journal = {IEEE Transactions on Information Forensics and Security},\n author = {S Chen and A Pande and K Zeng and P Mohapatra},\n title = { Live Video Forensics: Source Identification in Lossy Wireless Networks },\n year = {to appear},\n pages = {215-219},\n abstract = {Video source identification is very important in validating video evidence, \ntracking down video piracy crimes and regulating individual video sources. With the prevalence of wireless communication, \nwireless video cameras continue to replace their wired counterparts in security / surveillance systems and tactical networks.\n However, wirelessly streamed videos usually suffer from blocking and blurring due to inevitable packet loss in wireless\n transmissions. The existing source identification methods experience significant performance degradation or even fail to work \nwhen identifying videos with blocking and blurring. In this paper, we propose a method which is effective and efficient \nin identifying such wirelessly streamed videos. In addition, we also propose to incorporate wireless channel signatures\n and selective frame processing into source identification, which significantly improve the identification speed.},\n keywords = {SecurityPrivacyandTrust,WirelessNetworks}\n}","bibtype":"article","id":"chenvideoTIFS","journal":"IEEE Transactions on Information Forensics and Security","key":"chenvideoTIFS","keywords":"SecurityPrivacyandTrust,WirelessNetworks","pages":"215-219","title":"Live Video Forensics: Source Identification in Lossy Wireless Networks","type":"article","year":"to appear","bibbaseid":"chen-pande-zeng-mohapatra-livevideoforensicssourceidentificationinlossywirelessnetworks-toappear","role":"author","urls":{},"keyword":["SecurityPrivacyandTrust","WirelessNetworks"],"downloads":0},"bibtype":"article","biburl":"http://www.cs.ucdavis.edu/~amit/pamit2.bib","creationDate":"2014-09-29T16:39:37.196Z","downloads":0,"keywords":["securityprivacyandtrust","wirelessnetworks"],"search_terms":["live","video","forensics","source","identification","lossy","wireless","networks","chen","pande","zeng","mohapatra"],"title":"Live Video Forensics: Source Identification in Lossy Wireless Networks","year":null,"dataSources":["eaD4cvM8ipWoG4mZN"]}