2020
DOI: 10.1016/j.ins.2020.05.134
|View full text |Cite
|
Sign up to set email alerts
|

Dense moment feature index and best match algorithms for video copy-move forgery detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…In video forensics, the problems related to computational cost and detection accuracy are of significant concern to the development of the strategies, as even a video of short length may run into thousands of frames. In addition, most previous approaches could not attain better computational efficiency and detection accuracy, not even revealing finding the forged areas with mirroring, as stated in References 8‐11.…”
Section: Introductionmentioning
confidence: 94%
“…In video forensics, the problems related to computational cost and detection accuracy are of significant concern to the development of the strategies, as even a video of short length may run into thousands of frames. In addition, most previous approaches could not attain better computational efficiency and detection accuracy, not even revealing finding the forged areas with mirroring, as stated in References 8‐11.…”
Section: Introductionmentioning
confidence: 94%
“…In the enhanced GWO technique, multi-objective functions like leader selection strategy and Pareto archive are applied to select the best solutions, and to eliminate the crowded segments. In the GWO technique, the encircling process is mathematically indicated in the next equations: (7) dis = |𝑐 × 𝑧 𝑢(𝑡) − 𝑧(𝑡)|, (8) 𝑧(𝑡 + 1) = 𝑧 𝑢(𝑡) − 𝑘 × dis, where dis represents distance, t states present iteration, 𝑧 𝑢(𝑡) indicates location of prey, 𝑧(𝑡) states position of grey wolf, 𝑘 and 𝑐 indicates coefficients. The coefficients 𝑘 = 2𝑜𝑟 1 − 𝑜 and 𝑐 = 2𝑟 2 , where 𝑜 is a decreasing parameter, 𝑟 1 and 𝑟 2 are random values that range between zero to one.…”
Section: Patch Segmentationmentioning
confidence: 99%
“…Numerous authentication techniques are introduced to secure the image communication process, where the authentication techniques are categorized into two types: active and passive authentication. Active authentication includes the techniques like cryptography, watermarking, etc., and inactive authentication, the original image content is available and compared with the test image, where the original image content is unavailable in passive authentication [7]. The test image is investigated without prior knowledge of the original image content, where this type of authentication is applied in forgery detection [8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…It is known that a higher F 1 score denotes performance better. Finally, the experiments are implemented on a computer with an Intel (R) Core i7-8700 @3.20 There are several state-of-the-art methods, including the Dense moment feature index and best match algorithm with radial-harmonic-Fourier moments (DMFIBM) (Zhong et al 2020), Bestagini et al (Bestagini et al 2013), MRPL method (Saddique et al 2020). However, the methods in the literatures of (Subramanyam and Emmanuel 2012) cannot be applied to real datasets like GRIP because they are with very restrictive assumptions on forgery videos.…”
Section: A Datasets For Video Copy-move Forgery Detectionmentioning
confidence: 99%
“…Video copy-move forgery achieves an excellent visual effect but requires relatively complex manipulation, that can be done with inter-frame and intra-frame (Zhong et al 2020). Inter-frame forgery pastes the copied objects from one frame to other corresponding frames in the video, while intra-frame forgery involves successive operations of pasting one or some copied objects from one frame into the same frame.…”
Section: Introductionmentioning
confidence: 99%