Video tempering detection assessment in full reference mode using difference matrices

被引:6
作者
Sharma, Gajanand [1 ]
Goyal, Dinesh [2 ]
机构
[1] Suresh GyanVihar Univ, Dept Comp Sci & Engn, Jaipur 302017, Rajasthan, India
[2] Poornima Inst Engn & Technol, Dept Comp Sci & Engn, Jaipur 302022, Rajasthan, India
关键词
Video Temporal Tempering Detection; No-Reference Mode; Machine Learning; MSE; PSNR;
D O I
10.1080/09720529.2019.1637159
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Frequent availability of low-speed internet connections together with easy availability of video capturing in the form of low-cost cameras and digital camcorders, and free video editing software running on low-cost machines, creates the possibility of real vulnerability in the video. To make improvements to images and videos, it is becoming easier for ordinary people to use malicious purposes to access digital doctor tools. This means that television, such as videos and videos on YouTube's popular Internet websites that have been shown to be images and videos, have been scattered and their honesty cannot always be allowed. On this paper, a video tempering detection technique is proposed under the entire reference scheme. This means that the original video file is compared to the analysis activity. The proposed project uses a general data structure which is called the difference matrix which is used as a purpose. The proposed project takes steps without traditional comparison because it indicates that video edits are made to include objects or it is simply a result of video brightness and contrast enhancement.
引用
收藏
页码:645 / 659
页数:15
相关论文
共 10 条
[1]  
Andrews LJB, 2017, J STAT MANAG SYST, V20, P659, DOI 10.1080/09720510.2017.1395186
[2]  
Best J, 2014, RETURN OF THE PUBLIC IN GLOBAL GOVERNANCE, P15
[3]  
Bestagini P., 2013, P IEEE INT WORKSH MU
[4]  
Eswaraprasad R, 2017, J STAT MANAG SYST, V20, P703, DOI 10.1080/09720510.2017.1395190
[5]   Exposing Postprocessed Copy-Paste Forgeries Through Transform-Invariant Features [J].
Kakar, Pravin ;
Sudha, N. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :1018-1028
[6]   Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions [J].
Kobayashi, Michihiro ;
Okabe, Takahiro ;
Sato, Yoichi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :883-892
[7]   A performance evaluation of routing protocols for vehicular ad hoc networks with swarm intelligence [J].
Poonia R.C. .
International Journal of System Assurance Engineering and Management, 2018, 9 (04) :830-835
[8]  
Raja L, 2019, ADV ENV ENG GREEN TE, P1, DOI 10.4018/978-1-5225-5909-2.ch001
[9]   A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks [J].
Rekhis, Slim ;
Boudriga, Noureddine .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :635-650
[10]   Temporal Forensics and Anti-Forensics for Motion Compensated Video [J].
Stamm, Matthew C. ;
Lin, W. Sabrina ;
Liu, K. J. Ray .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) :1315-1329