2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP) 2012
DOI: 10.1109/mmsp.2012.6343421
|View full text |Cite
|
Sign up to set email alerts
|

Video forgery detection using HOG features and compression properties

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
51
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(51 citation statements)
references
References 13 publications
0
51
0
Order By: Relevance
“…Bit rate reduction reduces the performance of the system. Ghost shadow artifact (Zhang et al, 2009) Cannot accurately locate the tampered areas in each frame; works well in static background videos only Noise and quantization residue (Chetty et al, 2010;Goodwin and Chetty, 2011) Sensitive to noise, too high or too low illumination; works well static background videos only Histogram of Oriented Gradients (HOG) (Subramanyam and Emmanuel, 2012) Works with fixed GOP; copypaste tampering alone is addressed VPF, histogram of DCT coefficients (Labartino et al, 2013) Presence of B-frames are not considered; works with Variable Bit Rate (VBR) coding only Spatio-temporal coherence (Lin and Tsay, 2014) Performance decreases with increase in compression Difference between current & nontampered reference frame (Su et al, 2015a) Works with static background videos; detection accuracy decreases when the deleted foreground is very small, or too fast moving Zernike moments and 3D patch match (D'Amiano et al, 2015) Accuracy is very low M A N U S C R I P T…”
Section: A C C E P T E D Accepted Manuscriptmentioning
confidence: 99%
See 1 more Smart Citation
“…Bit rate reduction reduces the performance of the system. Ghost shadow artifact (Zhang et al, 2009) Cannot accurately locate the tampered areas in each frame; works well in static background videos only Noise and quantization residue (Chetty et al, 2010;Goodwin and Chetty, 2011) Sensitive to noise, too high or too low illumination; works well static background videos only Histogram of Oriented Gradients (HOG) (Subramanyam and Emmanuel, 2012) Works with fixed GOP; copypaste tampering alone is addressed VPF, histogram of DCT coefficients (Labartino et al, 2013) Presence of B-frames are not considered; works with Variable Bit Rate (VBR) coding only Spatio-temporal coherence (Lin and Tsay, 2014) Performance decreases with increase in compression Difference between current & nontampered reference frame (Su et al, 2015a) Works with static background videos; detection accuracy decreases when the deleted foreground is very small, or too fast moving Zernike moments and 3D patch match (D'Amiano et al, 2015) Accuracy is very low M A N U S C R I P T…”
Section: A C C E P T E D Accepted Manuscriptmentioning
confidence: 99%
“…The works in (Milani et al, 2012b) and (Rocha et al, 2011) provide an overview on video forensics. A few works in the literature have the capability to localize the tampered regions in the video ( (Subramanyam and Emmanuel, 2012); (Labartino et al, 2013); (Lin and Tsay, 2014); (D'Amiano et al, 2015); (Feng et al, 2014)) whereas others can only classify the video as tampered or not ( (Wang and Farid, 2006); (Chen et al, 2015); (Bidokhti and Ghaemmaghami, 2015); (Su et al, 2011); (Dong et al, 2012); (Stamm et al, 2012)). …”
Section: Introductionmentioning
confidence: 99%
“…However, this approach did not work on the localization of tampered frames or on small forged regions. In reference [12], the authors studied a video forgery-detection algorithm based on the histogram of oriented gradients (HOG) feature-matching and video compression properties. This approach was effective and robust against various signal-processing manipulations.…”
Section: Introductionmentioning
confidence: 99%
“…A.V. et al [3] detected the spatial and temporal copy-paste tampering based on Histogram of Oriented Gradients (HOG) feature matching and video compression properties. For inter-frame forgeries, such as frame insertion and frame deletion forgeries, some effective methods were proposed [4,5].…”
Section: Introductionmentioning
confidence: 99%