Results 251 to 260 of about 143,909 (304)
Some of the next articles are maybe not open access.

A video database for intelligent video authentication

2017 International Conference on Computing, Communication and Automation (ICCCA), 2017
In this paper we describe a unique video database which consists of the real life moments of people and objects, captured under various illumination conditions and camera positions. We have classified all the videos of our database into six categories, out of which four categories are based on the movements of camera and objects (captured by the camera)
Jaspreet Kaur   +2 more
openaire   +1 more source

Deepfake Video Authentication Based on Blockchain

2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), 2021
Nowadays, it is difficult to predict the information such as news and videos on the internet is real or not and people are increasingly sharing it on social media without thinking of fake. As soon as they verify the authenticity of a video, they start expressing their concerns and sharing the opinions of others.
Ujwal Patil, P.M. Chouragade
openaire   +1 more source

Video Authentication

2013
With the growing innovations and emerging developments in sophisticated video editing technology, it is becoming highly desirable to assure the credibility and integrity of video information. Today digital videos are also increasingly transmitted over non-secure channels such as the Internet.
Saurabh Upadhyay   +2 more
openaire   +1 more source

H.264/AVC video authentication based video content

2010 5th International Symposium On I/V Communications and Mobile Network, 2010
This paper addresses the problem of ensuring the integrity and the authenticity of H.264/AVC video. It is achieved by authenticating each Group Of pictures (GOP) within the video separately. The proposed technique uses content based digital signature generated from robust features extracted from transform domain as fragile watermark and then embeds it ...
K. Ait Saadi, A. Bouridane, A. Gessoum
openaire   +1 more source

Video authentication in digital forensic

2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015
The large amount of video content is being transmitted over internet and other channels. With the help of existing multimedia editing tools one can easily change the content of data which lead to lose the authenticity of the information. Thus, it becomes necessary to develop different methods by which the authenticity of the videos can be confirmed. In
Ankita Gupta, Shilpi Gupta, Anu Mehra
openaire   +1 more source

Digital Video Authentication

2009
Digital video authentication has been a topic of immense interest to researchers in the past few years. Authentication of a digital video refers to the process of determining that the video taken is original and has not been tampered with. This chapter aims to provide an overview of digital video authentication systems and a universal review of the ...
Pradeep K. Atrey   +2 more
openaire   +1 more source

Intelligent Video Authentication

2013
With the innovations and development in sophisticated video editing technology, it is becoming increasingly significant to assure the trustworthiness of video information. Today digital videos are also increasingly transmitted over non-secure channels, such as the Internet.
Saurabh Upadhyay   +2 more
openaire   +1 more source

Motion trajectory based video authentication

Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03., 2003
With the relentless digitization of commercial media, it is increasingly susceptible to the violation of its intellectual property rights. We address the issue of authenticating digital video in this paper by presenting a novel technique based on motion trajectory and cryptographic secret sharing.
null Wei-Qi Yan, M.S. Kankanhalli
openaire   +1 more source

Authentication of digital video evidence

SPIE Proceedings, 2003
In response to a requirement from the United States Postal Inspection Service, the Technical Support Working Group tasked The Johns Hopkins University Applied Physics Laboratory (JHU/APL) to develop a technique tha will ensure the authenticity, or integrity, of digital video (DV).
Nicholas D. Beser   +2 more
openaire   +1 more source

Security camera video authentication

Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the 2nd Signal Processing Education Workshop., 2005
The ability to authenticate images captured by a security camera, and localise any tampered areas, will increase the value of these images as evidence in a court of law. This paper outlines the challenges in security camera video authentication, and discusses the reasons why fingerprinting, a robust type of digital signature, provides a solution ...
openaire   +1 more source

Home - About - Disclaimer - Privacy