Articles with "content authentication" as a keyword



Photo from wikipedia

Video content authentication techniques: a comprehensive survey

Sign Up to like & get
recommendations!
Published in 2017 at "Multimedia Systems"

DOI: 10.1007/s00530-017-0538-9

Abstract: In this digital day and age, we are becoming increasingly dependent on multimedia content, especially digital images and videos, to provide a reliable proof of occurrence of events. However, the availability of several sophisticated yet… read more here.

Keywords: video; research; content authentication; field ... See more keywords
Photo by homajob from unsplash

Security Analysis and Improvement of Dual Watermarking Framework for Multimedia Privacy Protection and Content Authentication

Sign Up to like & get
recommendations!
Published in 2023 at "Mathematics"

DOI: 10.3390/math11071689

Abstract: The demand for using multimedia network infrastructure for transmission grows with each passing day. Research scholars continue to develop new algorithms to strengthen the existing network security framework in order to ensure the privacy protection… read more here.

Keywords: privacy protection; security; protection content; content authentication ... See more keywords