2017
DOI: 10.1007/s00530-017-0538-9
|View full text |Cite
|
Sign up to set email alerts
|

Video content authentication techniques: a comprehensive survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 87 publications
(38 citation statements)
references
References 126 publications
0
35
0
Order By: Relevance
“…There are already a number of recent surveys which review tampering detection methods [14,15,16,17,18]. Tampering detection methods are broadly categorised as active or passive, with more focus on passive tampering detection methods.…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…There are already a number of recent surveys which review tampering detection methods [14,15,16,17,18]. Tampering detection methods are broadly categorised as active or passive, with more focus on passive tampering detection methods.…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…? Most of related digital forensic studies focused on multimedia tamper detection, source camera identification, or hidden data recovery [1][2][3]. The previous studies for the multimedia tamper detection can be classified into two groups: active intrusive approach and passive blind approach.…”
Section: Corrupted Partially Recoveredmentioning
confidence: 99%
“…While many studies for detecting the forged document, identifying the source digital device of multimedia, and recovering deleted files have been done [1][2][3], a little progress has been done for creation-time reconstruction of files recovered without the metadata of creation-time. In this article, we propose a creation order reconstruction method for recovered files upon the FAT32 file system with Windows operation systems.…”
Section: Introductionmentioning
confidence: 99%
“…For detecting the manipulated video with minimum errors a DNN was employed,although in [27] it was shown that this approach could not be transmitted to new video manipulation approaches. Singh and Aggarwal [28] after reviewing the video content authentication methods, noticed that for the genuine doctored videos there is no reliable database available. For image rebroadcast detection ahuge dataset was produced in [29].…”
Section: Related Workmentioning
confidence: 99%