Hello Guest. Sign Up to view and download full seminar reports               

SEMINAR TOPICS CATEGORY


Image Authentication Techniques

Added on: February 24th, 2012 by No Comments

This paper explores the various techniques used to authenticate the visual data recorded by the automatic video surveillance system. Automatic video surveillance systems are used for continuous and effective monitoring and reliable control of remote and dangerous sites. Some practical issues must be taken in to account, in order to take full advantage of the potentiality of VS system. The validity of visual data acquired, processed and possibly stored by the VS system, as a proof in front of a court of law is one of such issues.

But visual data can be modified using sophisticated processing tools without leaving any visible trace of the modification. So digital or image data have no value as legal proof, since doubt would always exist that they had been intentionally tampered with to incriminate or exculpate the defendant. Besides, the video data can be created artificially by computerized techniques such as morphing. Therefore the true origin of the data must be indicated to use them as legal proof. By data authentication we mean here a procedure capable of ensuring that data have not been tampered with and of indicating their true origin.

1 vote, average: 2.00 out of 51 vote, average: 2.00 out of 51 vote, average: 2.00 out of 51 vote, average: 2.00 out of 51 vote, average: 2.00 out of 5 (1 votes, average: 2.00 out of 5)
You need to be a registered member to rate this topic.
Loading...
Recommend this topic
More Details About This Topic => View Full Seminar Report




References for Image Authentication Techniques

https://seminartopics.info
Topic Category - Computer/IT Topics

Related Topics

Access Premium Seminar Reports: Subscribe Now



Sign Up for comprehensive seminar reports & presentations: DOCX, PDF, PPTs.