We co-exist in an era, where tonnes and tonnes of
videos are uploaded every day. Video copy detection has become
the need for the hour as most of them are user generated
Internet videos through popular sites such as YouTube. It acts
as a medium to restrain piracy and prove whether the contents
are legitimate. The usual procedure adopted in video copy
detection techniques include discovering whether a query
video is copied from a database of videos or not. This paper
acquaints different Video copy detection techniques that have
been adopted to ensure robust and secure videos along some
applications of video fingerprinting.
%0 Generic
%1 sumanelizabethdaniel2013exploration
%A Suman Elizabeth Daniel, Binu A.
%B 2013 Information Technology and Power Electronics
%D 2013
%E R.Rajesh, Dr.
%I ACEEE (A Computer division of IDES)
%K Detection Fingerprints Video copy
%T An Exploration based on Multifarious Video Copy Detection Strategies
%X We co-exist in an era, where tonnes and tonnes of
videos are uploaded every day. Video copy detection has become
the need for the hour as most of them are user generated
Internet videos through popular sites such as YouTube. It acts
as a medium to restrain piracy and prove whether the contents
are legitimate. The usual procedure adopted in video copy
detection techniques include discovering whether a query
video is copied from a database of videos or not. This paper
acquaints different Video copy detection techniques that have
been adopted to ensure robust and secure videos along some
applications of video fingerprinting.
@conference{sumanelizabethdaniel2013exploration,
abstract = {We co-exist in an era, where tonnes and tonnes of
videos are uploaded every day. Video copy detection has become
the need for the hour as most of them are user generated
Internet videos through popular sites such as YouTube. It acts
as a medium to restrain piracy and prove whether the contents
are legitimate. The usual procedure adopted in video copy
detection techniques include discovering whether a query
video is copied from a database of videos or not. This paper
acquaints different Video copy detection techniques that have
been adopted to ensure robust and secure videos along some
applications of video fingerprinting.},
added-at = {2014-02-04T10:45:37.000+0100},
author = {Suman Elizabeth Daniel, Binu A.},
biburl = {https://www.bibsonomy.org/bibtex/2f78a6a7967683514a3b7954abd8faacc/idescitation},
booktitle = {2013 Information Technology and Power Electronics},
editor = {R.Rajesh, Dr.},
interhash = {3aa6d2e8225b8150270bc0ab867f0193},
intrahash = {f78a6a7967683514a3b7954abd8faacc},
keywords = {Detection Fingerprints Video copy},
organization = {Institute of Doctors Engineers and Scientists},
publisher = {ACEEE (A Computer division of IDES)},
timestamp = {2014-02-04T10:45:37.000+0100},
title = {An Exploration based on Multifarious Video Copy Detection Strategies},
year = 2013
}