2020
DOI: 10.1109/access.2020.2980951
|View full text |Cite
|
Sign up to set email alerts
|

Classification of Authentic and Tampered Video Using Motion Residual and Parasitic Layers

Abstract: These days, videos can be easily recorded, altered and shared on social and electronic media for deception and false propaganda. However, due to sophisticated nature of the content alteration tools, alterations remain inconspicuous to the naked eye and it is a challenging task to differentiate between authentic and tampered videos. During the process of video tampering the traces of objects, which are removed or modified, remain in the frames of a video. Based on this observation, in this study, a new method i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 48 publications
0
17
0
Order By: Relevance
“…Only a few state-of-the-art methods (Bestagini et al 2013;Lowe 2004;Saddique et al 2020;Su et al 2018;Subramanyam and Emmanuel 2012;Zhang et al 2015) can address video copy-move forgery detection. Subramanyam et al (Subramanyam and Emmanuel 2012), propose a Histogram of Oriented Gradients (HOG) feature matching and video compression properties to address only intra-frame forgery in MPEG4 format.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Only a few state-of-the-art methods (Bestagini et al 2013;Lowe 2004;Saddique et al 2020;Su et al 2018;Subramanyam and Emmanuel 2012;Zhang et al 2015) can address video copy-move forgery detection. Subramanyam et al (Subramanyam and Emmanuel 2012), propose a Histogram of Oriented Gradients (HOG) feature matching and video compression properties to address only intra-frame forgery in MPEG4 format.…”
Section: Related Workmentioning
confidence: 99%
“…It is known that a higher F 1 score denotes performance better. Finally, the experiments are implemented on a computer with an Intel (R) Core i7-8700 @3.20 There are several state-of-the-art methods, including the Dense moment feature index and best match algorithm with radial-harmonic-Fourier moments (DMFIBM) (Zhong et al 2020), Bestagini et al (Bestagini et al 2013), MRPL method (Saddique et al 2020). However, the methods in the literatures of (Subramanyam and Emmanuel 2012) cannot be applied to real datasets like GRIP because they are with very restrictive assumptions on forgery videos.…”
Section: A Datasets For Video Copy-move Forgery Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Tampering detection has been explored in many forensic methods, and localization of tampered images has recently become one of the most important methods for researchers 12‐17 . Tampering with an image (or a video) is described as “adding or removing essential features from an image (or a video) despite leaving any apparent indications of tampering.” Copy‐move, splicing, re‐sampling, resizing, noise changes and/or blurring, retouching, JPEG compression, luminance nonlinearities, and lighting inconsistencies are some of the most popular strategies adopted by attackers 18‐22 . The three prevalent tampering operations are (i) removing (or attempting to hide) an area in an image, (ii) inserting a new entity into such an image, and (iii) misrepresentation of image data (e.g., resizing an object within the image).…”
Section: Introductionmentioning
confidence: 99%
“…Copy-move, splicing, re-sampling, resizing, noise changes and/or blurring, retouching, JPEG compression, luminance nonlinearities, and lighting inconsistencies are some of the most popular strategies adopted by attackers. [18][19][20][21][22] The three prevalent tampering operations are (i) removing (or attempting to hide) an area in an image, (ii) inserting a new entity into such an image, and (iii) misrepresentation of image data…”
mentioning
confidence: 99%