InvestorsHub Logo
Followers 19
Posts 4105
Boards Moderated 0
Alias Born 12/31/2011

Re: Quaye post# 61191

Thursday, 05/04/2017 10:57:22 AM

Thursday, May 04, 2017 10:57:22 AM

Post# of 156700
Quote: The method involves using metadata associated with the image capture to authenticate and verify the images and videos, and protection of the metadata by public/private key encryption.The metadata may not only include time and date, but also other data such as camera settings (aperture,shutter speed, focal length, and so forth), camera orientation and movement data and context information such as SOUNDS or WORDS CAPTURED contemporaneously with the imagery, the direction in which the image was taken, and signals from nearby cell towers or WiFi hotspots.

Homeland Security could utilize these features in tracing images and videos on the web for possible terrorist connections. This technology is far reaching!

Volume:
Day Range:
Bid:
Ask:
Last Trade Time:
Total Trades:
  • 1D
  • 1M
  • 3M
  • 6M
  • 1Y
  • 5Y
Recent TTCM News