IMAGE AUTHENTICATION TECHNIQUE

SEMINAR ON IMAGE AUTHENTICATION TECHNIQUES:article explores the different techniques used to validate the visual recorded by automatic cameras. Auto video surveillance systems used for monitoring and effective reliable control of remote sites and hazardous waste. Some practical issues must be taken into account in order to take full advantage of opportunities VS system. The validity of visual data were acquired, processed and possibly stored VS system, as a protest outside a court is one of those questions. But visually The information can be edited using sophisticated management tools, leaving nothing visible sign of change. Thus, digital data, or image has no legal value, as proof, since doubts still exist, they had been deliberately falsified to incriminate or exonerate the accused. In addition to video data, created artificially by techniques such as computer morphing. Therefore, true origin of the data must be indicated for use as evidence in court. In the data authentication, we mean a process that ensures that the data has not been violated, and to indicate its true origin.


No comments:

Post a Comment