Results 261 to 270 of about 143,909 (304)
Some of the next articles are maybe not open access.
A Video Database for Intelligent Video Authentication
2018In this paper, we depict a special video database which comprises the genuine snapshots of individuals and items, caught under different light conditions and camera positions. We have arranged every one of the recordings of our database into six classifications, out of which four classifications depend on the developments of camera and articles (caught
Priya Gupta +3 more
openaire +1 more source
A Brief Survey on Video Authentication
International Journal of Scientific Research, 2012Though the immense development in digital information technology has brought us in the era of powerful information, we are having some severe challenging issues related with information. One of them is the cred- ibility of information. Today, editing or modifying the content of a digital video can be done efficiently and seamlessly.
Prayag Patel, Saurabh Upadhyay
openaire +1 more source
Separable authentication in encrypted HEVC video
Multimedia Tools and Applications, 2018A joint encryption and authentication scheme for HEVC compressed video is proposed in this work. It produces a HEVC format compliant video stream that permits the authentication process to be carried out irregardless of the video being in the encrypted or plaintext (i.e., decrypted) form.
Tew, Yiqi +3 more
openaire +2 more sources
Video compression and person authentication
1997In this paper, we address the possible effects of video compression on the visual quality of images, that should be considered by person authentication algorithms. We present the block based compression approach which is part of most of the current video compression standards, and two other classes of very low bitrate video compression methods, which ...
Franck Davoine +2 more
openaire +1 more source
Authentic video and classroom observation
System, 1993Abstract This paper suggests a creative solution to the problem of finding good-quality recordings of classroom events for an MA TESOL course on classroom observation. It begins with an anecdote from the author's own experience and then goes on to explain his rejection of home-made recordings and methodology demonstration series as sources of ...
openaire +1 more source
Authentic Emotion Detection in Real-Time Video
2004There is a growing trend toward emotional intelligence in human-computer interaction paradigms. In order to react appropriately to a human, the computer would need to have some perception of the emotional state of the human. We assert that the most informative channel for machine perception of emotions is through facial expressions in video.
Y. Sun +3 more
openaire +2 more sources
Video stream authentication in lossy networks
IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006., 2006It is well known that packets may be lost when video stream is transmitted over wireless network. To authenticate real time multicast streams with less overhead but at higher probabilities, most of previous stream authentication schemes insert packet hashes into the packet bodies explicitly.
null Yongdong Wu, null Tieyan Li
openaire +1 more source
Authentic Video in Intermediate German
Die Unterrichtspraxis / Teaching German, 1992The visual medium has long been a successful catalyst in foreign language teaching. Photographs and photocopies, slides, overhead projectors, and films have provided many an instructor with concrete images of topics discussed in the classroom. With the advent of the VCR, the advantages of these various media have been to a certain extent combined and ...
openaire +1 more source
Compressed Domain Authentication of Live Video
2007 IEEE International Conference on Signal Processing and Communications, 2007Video authentication techniques generally do not allow any form of manipulation, thus making it impractical for adaptation operations. Moreover, conventional way to adapt and authenticate compressed video content is to perform cascaded decoding and re-encoding operations in some trusted intermediary nodes.
Razib Iqbal +2 more
openaire +1 more source
Unequal authenticity protection of video multicasting
2008 IEEE International Conference on Multimedia and Expo, 2008Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack ...
null Jian-Ru Chen, null Chun-Shien Lu
openaire +1 more source

