Add and Checkout to Download this Report
Automatic Video Surveillance systems are used for the continuous and effective monitoring of dangerous and remote sites. In VS systems the primary importance is given to authentication of the video content. The video can be recorded by the VS system and it can be presented as proof in front of court law. The digital images and videos can be manipulated very easily nowadays without leaving any trace of modification. Image authentication is a way of providing legal proof to the digital image. By authentication technique we can detect if any content is tampered and we can indicate the true origin of data. In this report, the techniques of authenticating video surveillance image sequences are considered. After an introduction, the different techniques used for authentication, their advantages along with the drawbacks are discussed.