Digital video tampering detection: An overview of passive techniques

被引:88
|
作者
Sitara, K. [1 ,2 ]
Mehtre, B. M. [1 ]
机构
[1] Reserve Bank India, IDRBT, CCS, Hyderabad 500057, Andhra Pradesh, India
[2] Univ Hyderabad, Sch Comp Sci & Informat Sci SCIS, Hyderabad 500046, Andhra Pradesh, India
关键词
Video forgery detection; Video tampering detection; Video forensics; Video anti-forensics; Passive forensics; FORGERY; COMPRESSION; FORENSICS;
D O I
10.1016/j.diin.2016.06.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Video tampering is a process of malicious alteration of video content, so as to conceal an object, an event or change the meaning conveyed by the imagery in the video. Fast proliferation of video acquisition devices and powerful video editing software tools have made video tampering an easy task. Hence, the authentication of video files (especially in surveillance applications like bank ATM videos, medical field and legal concerns) are becoming important. Video tampering detection aims to find the traces of tampering and thereby evaluate the authenticity and integrity of the video file. These methods can be classified into active and passive (blind) methods. In this paper, we present a survey on passive video tampering detection methods. Passive video tampering detection methods are classified into the following three categories based on the type of forgery they address: Detection of double or multiple compressed videos, Region tampering detection and Video inter-frame forgery detection. At first, we briefly present the preliminaries of video files required for understanding video tampering forgery. The existing papers surveyed are presented concisely; the features used and their limitations are summarized in a compact tabular form. Finally, we have identified some open issues that help to identify new research areas in passive video tampering detection. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:8 / 22
页数:15
相关论文
共 50 条
  • [31] An Overview of Digital Video Watermarking
    Asikuzzaman, Md.
    Pickering, Mark R.
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (09) : 2131 - 2153
  • [32] A Robust Algorithm for Digital Image Copyright Protection and Tampering Detection: Employing DWT, DCT, and Blowfish Techniques
    Salama, Ahmed S.
    Shoitan, Rasha
    Abdallah, Mohamed S.
    Cho, Young Im
    Nagm, Ahmad M.
    TRAITEMENT DU SIGNAL, 2023, 40 (05) : 2019 - 2027
  • [33] Markovian rake transform for digital image tampering detection
    Sutthiwan P.
    Shi Y.Q.
    Zhao H.
    Ng T.-T.
    Su W.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6730 LNCS : 1 - 17
  • [34] DIGITAL WATERMARKING SCHEME FOR COPYRIGHT PROTECTION AND TAMPERING DETECTION
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2019, 11 (01): : 107 - 119
  • [35] Comprehensive Image Index and Detection of Tampering in a Digital Image
    Mall, Vinod
    Shukla, Shivanshu
    Mitra, Suman K.
    Roy, Anil K.
    2013 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2013,
  • [36] Detection of Tampering in Lossy Compressed Digital Audio Recordings
    Korycki, Rafal
    2012 JOINT CONFERENCE NEW TRENDS IN AUDIO & VIDEO AND SIGNAL PROCESSING: ALGORITHMS, ARCHITECTURES, ARRANGEMENTS, & APPLICATIONS (NTAV-SPA 2012), 2012, : 97 - 101
  • [37] A review of digital video tampering: From simple editing to full synthesis
    Johnston, Pamela
    Elyan, Eyad
    DIGITAL INVESTIGATION, 2019, 29 : 67 - 81
  • [38] DIGITAL AUDIO TAMPERING DETECTION BASED ON ENF CONSISTENCY
    Wang, Zhi-Feng
    Wang, Jing
    Zeng, Chun-Yan
    Min, Qiu-Sha
    Tian, Yuan
    Zuo, Ming-Zhang
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION (ICWAPR), 2018, : 209 - 214
  • [39] DNN Based Ant Colony Optimization for Video Tampering Detection
    Patnayakuni, Siva Prasad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (09): : 832 - 839
  • [40] Video authentication using spatio temporal relationship for tampering detection
    Sowmya, K. N.
    Chennamma, H. R.
    Rangarajan, Lalitha
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 159 - 169