Results 261 to 270 of about 143,909 (304)
Some of the next articles are maybe not open access.

A Video Database for Intelligent Video Authentication

2018
In this paper, we depict a special video database which comprises the genuine snapshots of individuals and items, caught under different light conditions and camera positions. We have arranged every one of the recordings of our database into six classifications, out of which four classifications depend on the developments of camera and articles (caught
Priya Gupta   +3 more
openaire   +1 more source

A Brief Survey on Video Authentication

International Journal of Scientific Research, 2012
Though the immense development in digital information technology has brought us in the era of powerful information, we are having some severe challenging issues related with information. One of them is the cred- ibility of information. Today, editing or modifying the content of a digital video can be done efficiently and seamlessly.
Prayag Patel, Saurabh Upadhyay
openaire   +1 more source

Separable authentication in encrypted HEVC video

Multimedia Tools and Applications, 2018
A joint encryption and authentication scheme for HEVC compressed video is proposed in this work. It produces a HEVC format compliant video stream that permits the authentication process to be carried out irregardless of the video being in the encrypted or plaintext (i.e., decrypted) form.
Tew, Yiqi   +3 more
openaire   +2 more sources

Video compression and person authentication

1997
In this paper, we address the possible effects of video compression on the visual quality of images, that should be considered by person authentication algorithms. We present the block based compression approach which is part of most of the current video compression standards, and two other classes of very low bitrate video compression methods, which ...
Franck Davoine   +2 more
openaire   +1 more source

Authentic video and classroom observation

System, 1993
Abstract This paper suggests a creative solution to the problem of finding good-quality recordings of classroom events for an MA TESOL course on classroom observation. It begins with an anecdote from the author's own experience and then goes on to explain his rejection of home-made recordings and methodology demonstration series as sources of ...
openaire   +1 more source

Authentic Emotion Detection in Real-Time Video

2004
There is a growing trend toward emotional intelligence in human-computer interaction paradigms. In order to react appropriately to a human, the computer would need to have some perception of the emotional state of the human. We assert that the most informative channel for machine perception of emotions is through facial expressions in video.
Y. Sun   +3 more
openaire   +2 more sources

Video stream authentication in lossy networks

IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006., 2006
It is well known that packets may be lost when video stream is transmitted over wireless network. To authenticate real time multicast streams with less overhead but at higher probabilities, most of previous stream authentication schemes insert packet hashes into the packet bodies explicitly.
null Yongdong Wu, null Tieyan Li
openaire   +1 more source

Authentic Video in Intermediate German

Die Unterrichtspraxis / Teaching German, 1992
The visual medium has long been a successful catalyst in foreign language teaching. Photographs and photocopies, slides, overhead projectors, and films have provided many an instructor with concrete images of topics discussed in the classroom. With the advent of the VCR, the advantages of these various media have been to a certain extent combined and ...
openaire   +1 more source

Compressed Domain Authentication of Live Video

2007 IEEE International Conference on Signal Processing and Communications, 2007
Video authentication techniques generally do not allow any form of manipulation, thus making it impractical for adaptation operations. Moreover, conventional way to adapt and authenticate compressed video content is to perform cascaded decoding and re-encoding operations in some trusted intermediary nodes.
Razib Iqbal   +2 more
openaire   +1 more source

Unequal authenticity protection of video multicasting

2008 IEEE International Conference on Multimedia and Expo, 2008
Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack ...
null Jian-Ru Chen, null Chun-Shien Lu
openaire   +1 more source

Home - About - Disclaimer - Privacy