2011
DOI: 10.5121/ijcses.2011.2406
|View full text |Cite
|
Sign up to set email alerts
|

Video Authentication- An Overview

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 50 publications
0
14
0
Order By: Relevance
“…It can be done for several purposes, for instance, to manipulate the integrity of an individual, to offend an individual, or to hide the content of information provided in the video [2].In short, it is easy to alter the content of information maliciously, that leads to serious issues for the researchers to be solved.…”
Section: Tampering Of the Video Contentmentioning
confidence: 99%
See 4 more Smart Citations
“…It can be done for several purposes, for instance, to manipulate the integrity of an individual, to offend an individual, or to hide the content of information provided in the video [2].In short, it is easy to alter the content of information maliciously, that leads to serious issues for the researchers to be solved.…”
Section: Tampering Of the Video Contentmentioning
confidence: 99%
“…When a malicious modification is performed on a video, it either attacks on the contents of the video (i.e. visual information presented by the frames of the video), or attacks on the temporal dependency between the frames [2]. The techniques are used to verify that video is either authentic or tampered.…”
Section: Video Tampering Attacks and Detectionmentioning
confidence: 99%
See 3 more Smart Citations