• No results found

Video Authentication

A Secure and Robust Object Based Video Authentication System

A Secure and Robust Object Based Video Authentication System

... object-based video authentica- tion system are different from those for a frame-based video authentication system; and these requirements are usually application ...during video trans- mission ...

16

Frame rate block selection approach based digital water marking for 
		efficient video authentication 
		using network conditions

Frame rate block selection approach based digital water marking for efficient video authentication using network conditions

... for Video Authentication [10], employs pipeline structure and uses ...based video authentication system using this watermarking technique features minimum video quality degradation and ...

6

FPGA implementation of a digital watermarking system for video 
		authentication

FPGA implementation of a digital watermarking system for video authentication

... Digital video sequences are very vulnerable to manipulations and alterations using widely available editing ...some authentication techniques are needed in order to maintain authenticity, integrity, and ...

6

Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics

Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics

... the authentication data by marking the video is possible [1, ...existing authentication methods, we find the works in [1, 3, 4, 5, ...the video authentication field where the authors ...

5

Secured Digital Video Authentication System

Secured Digital Video Authentication System

... secured video authentication work done in MATLAB ...the video and then extract all the ...encrypted video. This encrypted video is ...original video. The images show the results ...

5

BLIND DIGITAL VIDEO WATERMARKING TECHNIQUE FOR VIDEO AUTHENTICATION BY USING DISCRETE WAVELET TRANSFORM

BLIND DIGITAL VIDEO WATERMARKING TECHNIQUE FOR VIDEO AUTHENTICATION BY USING DISCRETE WAVELET TRANSFORM

... ABSTRACT: In recent times, Internet is being increasingly used as the platform for distribution of digital multimedia content. The inherent flexibility of Internet facilitates users to transact with one another to ...

14

A Lightweight Network Code based Authentication Scheme to thwart Pollution attacks in H.264/AVC Video Streaming

A Lightweight Network Code based Authentication Scheme to thwart Pollution attacks in H.264/AVC Video Streaming

... several video coding standards are introduced to reduce the data size on the communication channel, the dependency of coding created new challenges and ...Such video coding standards such as ...lightweight ...

7

Digital Video Forgery Detection and Authentication Technique - A Review

Digital Video Forgery Detection and Authentication Technique - A Review

... Digital video is very important in day to day ...and video. The invention of video editing technology, video are used in a wide ...Digital video is useful in education, medical ...

6

VIDEO ENCODING WITH AUTHENTICATION USING MULTIWAVELET TRANSFORM   http://u-o-i.org/1.01/ijrpet/62619523

VIDEO ENCODING WITH AUTHENTICATION USING MULTIWAVELET TRANSFORM http://u-o-i.org/1.01/ijrpet/62619523

... input video contains the video in which the watermark is to be ...load video key is used for loading the input. While loading input video, the corresponding video will be displayed in ...

5

Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions

Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions

... the authentication results of SC1 for more than 100 biometric signals are ...average authentication rate was ...on authentication results compared to BER ...the authentication results of SC2 ...

12

Security of Multifactor Authentication Model to Improve Authentication Systems

Security of Multifactor Authentication Model to Improve Authentication Systems

... We suggest to produce system work as three-factor-authentication . first the user have to login password, we prefer to use a PASSWORD as a knowledge factor than using of pin or pattern because of shoulder surfing ...

7

In-region  Authentication

In-region Authentication

... One can combine the two steps when R is a circular region by employing a secure DUB protocol: the verifier of the DUB protocol will be placed at the center of the region and the distance bound will be chosen as the ...

31

Application of Data Hiding in Audio -Video Using Anti Forensics Technique for Authentication and data Security

Application of Data Hiding in Audio -Video Using Anti Forensics Technique for Authentication and data Security

... audio, video, and images are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying ...

6

Authentication systems. Authentication methodologies. User authentication. Authentication systems (auth - april 2012)

Authentication systems. Authentication methodologies. User authentication. Authentication systems (auth - april 2012)

... Kerberos (simple authentication dialog) AS Authentication Server K S client (application) server user ID, {TGT} s request {TGT} s. Course Computer Systems Security - 2012[r] ...

16

802.1X Authentication

802.1X Authentication

... computer authentication, which will occur even when a user isn’t logged in to the ...802.1X authentication is successful, login window will authenticate the same user name and password to the external ...

37

Scalable Authentication

Scalable Authentication

... Sign transaction object: • Random Challenge • Name of relying party • Transaction Text Hash Signed by authentication key for this relying party. Transfer $10000 to John Doe‘s account 1[r] ...

38

IDENTIFICATION AND AUTHENTICATION

IDENTIFICATION AND AUTHENTICATION

... In assessing the cost of an authentication system there are several issues to consider. The first is the actual cost to purchase and install the required equipment and software. In general there is no additional ...

15

Authentication and Authorization

Authentication and Authorization

... According to a study by the Network Applications Con- sortium (NAC) [12] up to 44 hours a year is spent by employees solving authentication related problems. This is more than one week every year that could be ...

28

Anonymous Authentication

Anonymous Authentication

... anonymous authentication whereby the chat room server can verify that some authorized user is now logging in, but it has no idea exactly which ...Since authentication is anonymous, there is no way of ...

24

Show all 7306 documents...

Related subjects