G Zhao, F Li, H Yao, C Qin - Journal of Visual Communication and Image …, 2023 - Elsevier
In this paper, a robust fingerprinting scheme for video content authentication with two- dimensional attention mechanism and spatio-temporal weighted fusion called TASTNet is …
W Chen, W Gan, PS Yu - arXiv preprint arXiv:2408.14155, 2024 - arxiv.org
The explosive growth of multimedia content in the digital economy era has brought challenges in content recognition, copyright protection, and data management. As an …
CY Konyak, N Baydeti - Multimedia Tools and Applications, 2024 - Springer
Identical video sharing across social networks results in redundant video data traffic, consuming additional bandwidth, storage resources, and data usage. A novel method is …
G Zhao, C Qin, X Luo, X Zhang, CC Chang - Proceedings of the 2023 …, 2023 - dl.acm.org
In this paper, we propose an end-to-end perceptual robust hashing scheme for video copy detection based on unsupervised learning. Firstly, the spatio-temporal information in videos …
P Saini, R Ahuja - ECS Transactions, 2022 - iopscience.iop.org
The Authentication is the primary problem of cyber security as a dimension. It is just a method of approving a digital proof of identification. Different levels of access or completion …
C Rajeswary, M Thirumaran - 2023 International Conference …, 2023 - ieeexplore.ieee.org
The growing significance of short videos on video-sharing sites is accompanied by an escalation in misleading content, causing adverse social concerns. Therefore, it is important …
Identifying key content from a video is essential for many security applications such as motion/action detection, person re-identification and recognition. Moreover, summarizing the …