Tempo Temporal Forgery Video Detection Using Machine Learning Approach

被引:0
作者
Chittapur, Govindraj [1 ]
Murali, S. [2 ]
Anami, Basavaraj [3 ]
机构
[1] Basaveshwar Engn Coll, Dept Comp Applicat, Bagalkot 587102, India
[2] Maharaja Inst Technol, Dept Comp Sci & Engn, Belavadi 571477, Srirangpatna Tq, India
[3] KLE Inst Technol, Dept Comp Sci & Engn, Hubli 580030, India
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2020年 / 15卷 / 04期
关键词
Spatio-temporal; video-forgery; SVM; machine learning; forensic data set;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research paper explore a new way of detecting video forging between frames and intraframes by referring to the correlation coefficient using a frame continuity relationship. For any given video set, a groundbreaking technique called the "Spatio Temporal copy" produces video forgery detection using a machine learning method based on the continuous correlation between the conjugative sequences and the group of frames from the forgery video. The proposed forgery detection algorithm aims to identify the sequence groups forged intermediately by referring to the SVM classifier. Changing in the video sequence can result in a different fingerprint than collected initially, either at the spatial or at the temporal levels. Awareness of the statistical features that add frame continuity is the foundation for developing our algorithm to identify the video forgery detection that creates the duplicate. In the sequential continuity of the forged structures, we successfully identified the copy-move and copy delete frames, combining spatial and temporal fingerprints in an orderly and systematic approach. By referring the forensic standard data sets such as SULFA, VTD, and REWIND, we have tested and obtained high accuracy results with prominent researchers in the forensic video area
引用
收藏
页码:144 / 152
页数:9
相关论文
共 15 条
[1]  
Al-Sanjary OI, 2018, 2018 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS (ISCAIE 2018), P388, DOI 10.1109/ISCAIE.2018.8405504
[2]  
Bakas Jamimamul, 2018, 2018 International Conference on Information Technology (ICIT), P221, DOI 10.1109/ICIT.2018.00053
[3]  
Bestagini P, 2013, IEEE INT WORKSH MULT, P488, DOI 10.1109/MMSP.2013.6659337
[4]  
Chittapur Govindraj, LECTURENOTES ELECT E, P557, DOI [10.1007/978-81-322-1157-0_57, DOI 10.1007/978-81-322-1157-0_57]
[5]   Inter-frame forgery detection based on differential energy of residue [J].
Fadl, Sondos M. ;
Han, Qi ;
Li, Qiong .
IET IMAGE PROCESSING, 2019, 13 (03) :522-528
[6]   A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification [J].
Huang, Chee Cheun ;
Lee, Chien Eao ;
Thing, Vrizlynn L. L. .
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2020, 12 (01) :14-34
[7]   Development of a tampering dataset for forensic investigation [J].
Al-Sanjary, Omar Ismael ;
Ahmed, Ahmed Abdullah ;
Sulong, Ghazali .
FORENSIC SCIENCE INTERNATIONAL, 2016, 266 :565-572
[8]  
Karthikeyan P., 2020, INT J ADV RES ENG TE, V11, P246
[9]  
Kaur S, 2018, 2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), P418, DOI 10.1109/ICSCCC.2018.8703277
[10]   A passive blind forgery detection technique to identify frame duplication attack [J].
Kharat, Jayashree ;
Chougule, Sangeeta .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) :8107-8123