Abstract

The Authentication is the primary problem of cyber security as a dimension. It is just a method of approving a digital proof of identification. Different levels of access or completion of tasks are granted to different individuals, depending on who has signed up for the task at hand. There are many different types of authentication, ranging from passwords to fingerprints to bio metrics. These technologies add a layer of protection and prevent security lapses like data infringements. Digital video authentication is a method of evaluating whether the recorded video is genuine and has not been tampered with. Video hashing is commonly deployed in closer detection, video authentication and video tamper detection and a look for anti-piracy. Perceptual hashing has emerged as a powerful tool for verifying the validity of multimedia content and it continues to pique the interest of experts working in analyzing multimedia domains and spotting illegal or counterfeit videos on the internet.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call