2016
DOI: 10.1007/s11042-016-4004-z
|View full text |Cite
|
Sign up to set email alerts
|

Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(9 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…Methods in the first category usually extracted image features of each frame, such as texture features [9], color characteristics [9,16], histogram features [16], structural features [17], etc. Methods in the second category mainly utilized the impact of tampering on video features, including video encoding characteristic [18][19][20], double compression [21], motion features such as errors in motion estimation [10], optical flow, predict residual gradients [19], and brightness features such as segmented brightness variance descriptor (BBVD) [2], illumination information [4], etc.…”
Section: Methods Without Considering Noisesmentioning
confidence: 99%
“…Methods in the first category usually extracted image features of each frame, such as texture features [9], color characteristics [9,16], histogram features [16], structural features [17], etc. Methods in the second category mainly utilized the impact of tampering on video features, including video encoding characteristic [18][19][20], double compression [21], motion features such as errors in motion estimation [10], optical flow, predict residual gradients [19], and brightness features such as segmented brightness variance descriptor (BBVD) [2], illumination information [4], etc.…”
Section: Methods Without Considering Noisesmentioning
confidence: 99%
“…Aghamaleki and Behrad [9], leveraged on the spatial and time-domain analysis of quantization effect and developed a novel framework for forgery detection in MPEG videos. The model distinguished video segments into single compressed videos, double compressed videos without malicious tampering and double compressed videos with malicious tampering using a decision fusion algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…This is no longer the case, however, many published techniques, specific to particular types of tampering or source authentication, were assessed on proprietary datasets which remain unreleased [21,26,27,28,29]. In some cases, [30], datasets are detailed sufficiently in the literature so that they can be replicated, provided the sequences used for dataset synthesis are available. This serves to evidence the fragmentation of the tampering detection field.…”
Section: Accepted Manuscriptmentioning
confidence: 99%