2018
DOI: 10.3390/info9120301
|View full text |Cite
|
Sign up to set email alerts
|

An Inter-Frame Forgery Detection Algorithm for Surveillance Video

Abstract: Surveillance systems are ubiquitous in our lives, and surveillance videos are often used as significant evidence for judicial forensics. However, the authenticity of surveillance videos is difficult to guarantee. Ascertaining the authenticity of surveillance video is an urgent problem. Inter-frame forgery is one of the most common ways for video tampering. The forgery will reduce the correlation between adjacent frames at tampering position. Therefore, the correlation can be used to detect tamper operation. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…The proposed work and the related works are also tested on DERF data set alone after removing YouTube videos from the simulated data set and the results are published in Table 6. Although the proposed work is leading, other works [13, 16, 17, 18] are also comparatively good. So we conclude that our method is more robust to post‐processing attacks than other inter‐frame forgery detection methodologies and also yields good results for videos with no post‐processing attack.…”
Section: Resultsmentioning
confidence: 88%
See 2 more Smart Citations
“…The proposed work and the related works are also tested on DERF data set alone after removing YouTube videos from the simulated data set and the results are published in Table 6. Although the proposed work is leading, other works [13, 16, 17, 18] are also comparatively good. So we conclude that our method is more robust to post‐processing attacks than other inter‐frame forgery detection methodologies and also yields good results for videos with no post‐processing attack.…”
Section: Resultsmentioning
confidence: 88%
“…As most of the public data sets available are meant for intra-frame regional forgery, we simulated an inter-frame forged data set from publicly available videos. The frame-level forgery was generated by inserting/deleting/duplicating a random sequence of frames as [12][13][14][15][16][17][18] did. The original videos used for tampering creation were mostly taken from a public data set DERF (https://media.xiph.org/ video/derf/) and some of them from YouTube.…”
Section: Data Setmentioning
confidence: 99%
See 1 more Smart Citation
“…Bakas and Naskar [ 20 ] detected frame insertion, duplication and deletion using a 3D convolutional neural network that used another CNN layer, which was used for temporal information extraction from videos. Li et al [ 21 ] extracted features and localized abnormal points. In the extracting feature phase, the 2-D phase congruency of each frame was detected, since it was a good image characteristic.…”
Section: Related Workmentioning
confidence: 99%
“…Here the accuracy value for our proposed approach is determined by using following equation. (26) (26) Here,the number of forged videos that are normally designated as forged is represented as TP, FP indicates that the number of real videos that are incorrectly recognised as forged, the number of real videos that are correctly identified as real is represented as TN, and the number of videos that are mistakenly identified as authentic is indicated as FN [42].…”
Section: A Evaluation Standardsmentioning
confidence: 99%