2014 10th International Conference on Information Assurance and Security 2014
DOI: 10.1109/isias.2014.7064616
|View full text |Cite
|
Sign up to set email alerts
|

Passive video forgery detection techniques: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 36 publications
(23 citation statements)
references
References 18 publications
0
20
0
1
Order By: Relevance
“…This law was used to develop many double-compression detection approaches for digital images, and usually generated an accuracy of over 90%. When applied to videos, the efficiency of the detector reduced to about 70% [29].…”
Section: Detection Of Forgery Via Detection Of Double Compressionmentioning
confidence: 99%
See 3 more Smart Citations
“…This law was used to develop many double-compression detection approaches for digital images, and usually generated an accuracy of over 90%. When applied to videos, the efficiency of the detector reduced to about 70% [29].…”
Section: Detection Of Forgery Via Detection Of Double Compressionmentioning
confidence: 99%
“…[8], which are cropped and resized to eliminate objects at the extremities of the frames, thereby producing the forged frames (b) and (d), respectively [9,10] Over the years, a multitude of image forensic techniques have been developed, and have subsequently been analyzed and catalogued in various surveys [12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27]. However, only a few papers [11,[28][29][30][31] have appraised the innovations in the field of video forensics.…”
Section: Copy-paste Forgeries (Aka Partial Manipulation)mentioning
confidence: 99%
See 2 more Smart Citations
“…In order to validate the integrity and authenticity of digital videos, video forensic related approaches were developed. Video forensic has recently witnessed a great deal of concern in the research community because of its extensive applications in different areas ranging from digital media corporations, scientific research, publications, journalism, criminal investigations, and security surveillance systems that require the authentication and verification of a digital video as discussed in [5].The advancement in digital video technology has facilitated the way videos are manipulated using less expensive and affordable softwares such as Premiere 1 and Vegas 2 without leaving a visual trace [6] [7]. Illegal manipulation of digital video is extremely difficult and sometimes impossible to detect using visual examination.…”
Section: Introductionmentioning
confidence: 99%