Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function

SM Darwish, MM Abu-Deif, SM Elkaffas - PloS one, 2024 - journals.plos.org
As a direct result of advancements in digital technology and the Internet, the copyright
protection and information integrity of multimedia that are being published across the …

TASTNet: An end-to-end deep fingerprinting net with two-dimensional attention mechanism and spatio-temporal weighted fusion for video content authentication

G Zhao, F Li, H Yao, C Qin - Journal of Visual Communication and Image …, 2023 - Elsevier
In this paper, a robust fingerprinting scheme for video content authentication with two-
dimensional attention mechanism and spatio-temporal weighted fusion called TASTNet is …

Digital Fingerprinting on Multimedia: A Survey

W Chen, W Gan, PS Yu - arXiv preprint arXiv:2408.14155, 2024 - arxiv.org
The explosive growth of multimedia content in the digital economy era has brought
challenges in content recognition, copyright protection, and data management. As an …

Unique hash value based identical video sharing traffic flow optimization across social networks

CY Konyak, N Baydeti - Multimedia Tools and Applications, 2024 - Springer
Identical video sharing across social networks results in redundant video data traffic,
consuming additional bandwidth, storage resources, and data usage. A novel method is …

Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning

G Zhao, C Qin, X Luo, X Zhang, CC Chang - Proceedings of the 2023 …, 2023 - dl.acm.org
In this paper, we propose an end-to-end perceptual robust hashing scheme for video copy
detection based on unsupervised learning. Firstly, the spatio-temporal information in videos …

Watermarked hashing as a video content authentication technique

P Saini, R Ahuja - ECS Transactions, 2022 - iopscience.iop.org
The Authentication is the primary problem of cyber security as a dimension. It is just a
method of approving a digital proof of identification. Different levels of access or completion …

Enhancing Malicious Phishing Video Detection and Classification Using Sparrow Search Algorithm with Deep Learning Model

C Rajeswary, M Thirumaran - 2023 International Conference …, 2023 - ieeexplore.ieee.org
The growing significance of short videos on video-sharing sites is accompanied by an
escalation in misleading content, causing adverse social concerns. Therefore, it is important …

A video summarization approach to speed-up the analysis of child sexual exploitation material

R Biswas, D Chaves, L Fernández-Robles… - XLII Jornadas de …, 2021 - ruc.udc.es
Identifying key content from a video is essential for many security applications such as
motion/action detection, person re-identification and recognition. Moreover, summarizing the …