[HTML][HTML] A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions
AR Javed, Z Jalil, W Zehra, TR Gadekallu… - … Applications of Artificial …, 2021 - Elsevier
With the explosive advancements in smartphone technology, video uploading/downloading
has become a routine part of digital social networking. Video contents contain valuable …
has become a routine part of digital social networking. Video contents contain valuable …
A comprehensive survey on passive techniques for digital video forgery detection
Digital videos are one of the most widespread forms of multimedia in day to day life. These
are widely transferred over social networking websites such as Facebook, Instagram …
are widely transferred over social networking websites such as Facebook, Instagram …
A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions
With the advent of Internet, images and videos are the most vulnerable media that can be
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …
Using similarity analysis to detect frame duplication forgery in videos
J Yang, T Huang, L Su - Multimedia Tools and Applications, 2016 - Springer
Duplication of selected frames from a video to another location in the same video is one of
the most common methods of video forgery. However, few algorithms have been suggested …
the most common methods of video forgery. However, few algorithms have been suggested …
Inter-frame passive-blind forgery detection for video shot based on similarity analysis
DN Zhao, RK Wang, ZM Lu - Multimedia Tools and Applications, 2018 - Springer
Frame insertion, deletion and duplication are common inter-frame tampering operations in
digital videos. In this paper, based on similarity analysis, a passive-blind forensics scheme …
digital videos. In this paper, based on similarity analysis, a passive-blind forensics scheme …
Passive forensics in image and video using noise features: A review
Due to present of enormous free image and video editing software on the Internet, tampering
of digital images and videos have become very easy. Validating the integrity of images or …
of digital images and videos have become very easy. Validating the integrity of images or …
Detecting malicious false frame injection attacks on surveillance systems at the edge using electrical network frequency signals
Over the past few years, the importance of video surveillance in securing national critical
infrastructure has significantly increased, with applications including the detection of failures …
infrastructure has significantly increased, with applications including the detection of failures …
Phantom-CSI Attacks against Wireless Liveness Detection
All systems monitoring human behavior in real time are, by their nature, attractive targets for
spoofing. For example, misdirecting live-feed security cameras or voice-controllable Internet …
spoofing. For example, misdirecting live-feed security cameras or voice-controllable Internet …
An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues
Digital videos have become an important aspect of our lives lately, from a personal
memorable to surveillance videos which can be presented in a court as an evidence now …
memorable to surveillance videos which can be presented in a court as an evidence now …
A comprehensive survey on methods for image integrity
The outbreak of digital devices on the Internet, the exponential diffusion of data (images,
video, audio, and text), along with their manipulation/generation also by artificial intelligence …
video, audio, and text), along with their manipulation/generation also by artificial intelligence …