2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE) 2015
DOI: 10.1109/jcsse.2015.7219764
|View full text |Cite
|
Sign up to set email alerts
|

Video authentication using spatio-temporal signature for surveillance system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…Although the variables used for the hash and distances are integers, one can use a theoretical analysis on continuous data given the large number of features and video samples in our experiments. If the compared hashes in (32) correspond to two videos that are completely independent and visually distinct, the terms |H…”
Section: A Hash Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…Although the variables used for the hash and distances are integers, one can use a theoretical analysis on continuous data given the large number of features and video samples in our experiments. If the compared hashes in (32) correspond to two videos that are completely independent and visually distinct, the terms |H…”
Section: A Hash Analysismentioning
confidence: 99%
“…Given 200 distinct videos, 19900 identification distances have been computed using (32). The distribution of the distance is illustrated by Fig.…”
Section: A Hash Analysismentioning
confidence: 99%
See 3 more Smart Citations