Video content authentication techniques: a comprehensive survey

RD Singh, N Aggarwal - Multimedia Systems, 2018 - Springer
In this digital day and age, we are becoming increasingly dependent on multimedia content,
especially digital images and videos, to provide a reliable proof of occurrence of events …

Visual user-generated content verification in journalism: An overview

SA Khan, G Sheikhi, AL Opdahl, F Rabbi… - IEEE …, 2023 - ieeexplore.ieee.org
Over the past few years, social media has become an indispensable part of the news
generation and dissemination cycle on the global stage. These digital channels along with …

Driverless vehicle security: Challenges and future research opportunities

G De La Torre, P Rad, KKR Choo - Future Generation Computer Systems, 2020 - Elsevier
As self-driving vehicles become increasingly popular, new generations of attackers will seek
to exploit vulnerabilities introduced by the technologies that underpin such vehicles for a …

Video tamper detection based on multi-scale mutual information

W Wei, X Fan, H Song, H Wang - Multimedia Tools and Applications, 2019 - Springer
Video frame manipulation has become commonplace with the growing easy access to
powerful computing abilities. One of the most common types of video frame tampers is the …

Deep convolutional neural network for graphics forgery detection in video

H Kaur, N Jindal - Wireless Personal Communications, 2020 - Springer
Doctored video generation with easily accessible editing software has proved to be a major
problem in maintaining its authenticity. Nowadays, deep neural networks have been …

[PDF][PDF] Spatial Video Forgery Detection and Localization using Texture Analysis of Consecutive Frames.

M Saddique, K Asghar, UI Bajwa… - Advances in Electrical …, 2019 - academia.edu
Now-a-days, videos can be easily recorded and forged with user-friendly editing tools.
These videos can be shared on social networks to make false propaganda. During the …

Adaptive photo-response non-uniformity noise removal against image source attribution

A Karaküçük, AE Dirik - Digital Investigation, 2015 - Elsevier
The main objective of image source anonymization is to protect the identity of the
photographer against any attempts to identify the source camera device through PRNU …

Classification of authentic and tampered video using motion residual and parasitic layers

M Saddique, K Asghar, UI Bajwa, M Hussain… - IEEE …, 2020 - ieeexplore.ieee.org
These days, videos can be easily recorded, altered and shared on social and electronic
media for deception and false propaganda. However, due to sophisticated nature of the …

A comprehensive survey on state-of-the-art video forgery detection techniques

S Mohiuddin, S Malakar, M Kumar, R Sarkar - Multimedia Tools and …, 2023 - Springer
Video plays a key role in carrying authenticity, especially in the surveillance system, medical
field, court evidence, journalism, and social media among others. However, nowadays the …

Detection and localization of copy-paste forgeries in digital videos

RD Singh, N Aggarwal - Forensic science international, 2017 - Elsevier
Amidst the continual march of technology, we find ourselves relying on digital videos to
proffer visual evidence in several highly sensitive areas such as journalism, politics, civil and …