V. Vijayalakshmi, R. Vasitha, V. Vanitha, M. Gayathri
{"title":"A survey on real time authentication and tampering detection in digital video","authors":"V. Vijayalakshmi, R. Vasitha, V. Vanitha, M. Gayathri","doi":"10.1109/STARTUP.2016.7583926","DOIUrl":null,"url":null,"abstract":"The field of Real Time Authentication on videos follows rapid improvements in recent years because of the common counterfeits and illegal sharing of Digital media. Real Time Authentication for videos is becoming popular to secure the personal videos. People today have become well aware of the intrusions of their personal videos and are very reluctant to share on internet. This paper provides a wide survey of different Real Time Authentication algorithms and techniques and plug out their merits and demerits.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STARTUP.2016.7583926","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The field of Real Time Authentication on videos follows rapid improvements in recent years because of the common counterfeits and illegal sharing of Digital media. Real Time Authentication for videos is becoming popular to secure the personal videos. People today have become well aware of the intrusions of their personal videos and are very reluctant to share on internet. This paper provides a wide survey of different Real Time Authentication algorithms and techniques and plug out their merits and demerits.