Video content authentication techniques: a comprehensive survey
RD Singh, N Aggarwal - Multimedia Systems, 2018 - Springer
In this digital day and age, we are becoming increasingly dependent on multimedia content,
especially digital images and videos, to provide a reliable proof of occurrence of events …
especially digital images and videos, to provide a reliable proof of occurrence of events …
Visual user-generated content verification in journalism: An overview
Over the past few years, social media has become an indispensable part of the news
generation and dissemination cycle on the global stage. These digital channels along with …
generation and dissemination cycle on the global stage. These digital channels along with …
Driverless vehicle security: Challenges and future research opportunities
G De La Torre, P Rad, KKR Choo - Future Generation Computer Systems, 2020 - Elsevier
As self-driving vehicles become increasingly popular, new generations of attackers will seek
to exploit vulnerabilities introduced by the technologies that underpin such vehicles for a …
to exploit vulnerabilities introduced by the technologies that underpin such vehicles for a …
Video tamper detection based on multi-scale mutual information
Video frame manipulation has become commonplace with the growing easy access to
powerful computing abilities. One of the most common types of video frame tampers is the …
powerful computing abilities. One of the most common types of video frame tampers is the …
Deep convolutional neural network for graphics forgery detection in video
Doctored video generation with easily accessible editing software has proved to be a major
problem in maintaining its authenticity. Nowadays, deep neural networks have been …
problem in maintaining its authenticity. Nowadays, deep neural networks have been …
[PDF][PDF] Spatial Video Forgery Detection and Localization using Texture Analysis of Consecutive Frames.
Now-a-days, videos can be easily recorded and forged with user-friendly editing tools.
These videos can be shared on social networks to make false propaganda. During the …
These videos can be shared on social networks to make false propaganda. During the …
Adaptive photo-response non-uniformity noise removal against image source attribution
A Karaküçük, AE Dirik - Digital Investigation, 2015 - Elsevier
The main objective of image source anonymization is to protect the identity of the
photographer against any attempts to identify the source camera device through PRNU …
photographer against any attempts to identify the source camera device through PRNU …
Classification of authentic and tampered video using motion residual and parasitic layers
These days, videos can be easily recorded, altered and shared on social and electronic
media for deception and false propaganda. However, due to sophisticated nature of the …
media for deception and false propaganda. However, due to sophisticated nature of the …
A comprehensive survey on state-of-the-art video forgery detection techniques
Video plays a key role in carrying authenticity, especially in the surveillance system, medical
field, court evidence, journalism, and social media among others. However, nowadays the …
field, court evidence, journalism, and social media among others. However, nowadays the …
Detection and localization of copy-paste forgeries in digital videos
RD Singh, N Aggarwal - Forensic science international, 2017 - Elsevier
Amidst the continual march of technology, we find ourselves relying on digital videos to
proffer visual evidence in several highly sensitive areas such as journalism, politics, civil and …
proffer visual evidence in several highly sensitive areas such as journalism, politics, civil and …