2016
DOI: 10.17485/ijst/2016/v9i44/105142
|View full text |Cite
|
Sign up to set email alerts
|

Video Inter-frame Forgery Detection: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 0 publications
0
5
0
1
Order By: Relevance
“…It refers to cropping and enlarging the outer portion of a video frame to remove an area or object that might represent any evidence of incriminating events [50], [51]. Figure 11 depicts an example of an upscale crop video tampering where Figure 11 (a) shows the original scene whilst Figure 11 (b) illustrates the fake video created in Figure 11 (a) where the walking lady has been removed.…”
Section: Upscale Crop Forgerymentioning
confidence: 99%
“…It refers to cropping and enlarging the outer portion of a video frame to remove an area or object that might represent any evidence of incriminating events [50], [51]. Figure 11 depicts an example of an upscale crop video tampering where Figure 11 (a) shows the original scene whilst Figure 11 (b) illustrates the fake video created in Figure 11 (a) where the walking lady has been removed.…”
Section: Upscale Crop Forgerymentioning
confidence: 99%
“…More recently, the advent of deep learning techniques has enhanced the capabilities of image integrity detection and verification, outperforming traditional methods in several image-related tasks, especially in these where anti-forensic tools were used [109], [110], [115]. In the context of video files, we can find surveys on video steganalysis [109], [110], [116], video forgery detection [91], [92], [94], [110], [117], [118], video forensic tools [91], [109], [119], [120], video surveillance analysis [121], [122], and video content authentication [123]. Finally, digital audio forensics has also been studied in [124].…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
“…Standardized evaluation procedures and benchmarks [90], [94]- [96], [98], [100], [101], [104], [109]- [114], [116], [117], [123] Explore the use of novel AI methods and novel data types [88], [91], [93], [95], [99], [100], [103], [104], [106], [107], [109], [110], [112], [113], [115], [118], [121]- [124] Robust pre-processing and feature extraction [90], [91], [94], [97], [99], [101], [102], [105], [106], [109], [115], [117], [118], [121], [123], [124] Reduce training and data acquisition overheads [89], [91]…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
“…A warning is made in [35], where authors state that multiple compressions were an under-explored topic and that it is risky to make assumptions regarding the authenticity of digital content simply on the basis of the presence of double compression. Their claim was supported by the simple fact that digital content available on the Internet generally undergoes more than one compression, even if video is only transmitted, uploaded, downloaded or watched.…”
Section: Recompression Detectionmentioning
confidence: 99%