Copy-Move Video Forgery Detection Techniques: A Systematic Survey with Comparisons, Challenges and Future Directions

被引:0
|
作者
Singh, Gurvinder [1 ]
Singh, Kulbir [1 ]
机构
[1] Thapar Inst Engn & Technol, Dept Elect & Commun Engn, Patiala, Punjab, India
关键词
Copy-Move forgery; Spatial tempering; Temporal tempering; Passive techniques; Challenges; DUPLICATION FORGERY; TAMPERING DETECTION; DETECTION ALGORITHM; FRAME; LOCALIZATION; MOTION; DCT; INCONSISTENCY; COEFFICIENT;
D O I
10.1007/s11277-024-10996-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In the real-world scenario, the digital videos are captured to keep in records the life related memories, security purpose, truthful evidence etc. Due to rise in multimedia technology, the digital videos are mostly posted over social websites and applications such as Facebook, Instagram, What's App, YouTube, etc. through the internet in daily routine. The contents of these social digital videos are manipulated by easily available editing tools and software. Therefore, the security of digital videos over social media are the most important requirement of people. This paper presents a systematic survey on Copy-Move forgery and its detection with several passive techniques in the digital videos. At first, Copy-Move forgery is introduced with its various types in this paper. Then, a survey is provided on the existing passive techniques for detecting Copy-Move forgery in digital videos. Here, brief review of techniques is also presented in the tabular forms with their used features, datasets, parameters, type of forgery and their limitations. Furthermore, this survey provides the parameters and datasets in detail which are used for the evaluation of existing techniques. Besides, the detecting tools for Copy-Move video forgery and its future directions are detailed in this survey. This paper also provides various new challenges for automatic detection of Copy-Move video forgery in the realm of deep learning.
引用
收藏
页码:1863 / 1913
页数:51
相关论文
共 50 条
  • [21] Study and Analysis of Copy-Move & Splicing Image Forgery Detection Techniques
    Jwaid, Mohanad Fadhil
    Baraskar, Trupti N.
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 697 - 702
  • [22] Copy-move forgery detection based on multifractals
    Aleksandra Pavlović
    Natasa Glišović
    Ana Gavrovska
    Irini Reljin
    Multimedia Tools and Applications, 2019, 78 : 20655 - 20678
  • [23] Copy-Move Forgery Detection Based on PHT
    Li, Leida
    Li, Shushang
    Wang, Jun
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 1061 - 1065
  • [24] ROTATION ROBUST DETECTION OF COPY-MOVE FORGERY
    Li, Weihai
    Yu, Nenghai
    2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, : 2113 - 2116
  • [25] Adaptive Matching for Copy-Move Forgery Detection
    Zandi, Mohsen
    Mahmoudi-Aznaveh, Ahmad
    Mansouri, Azadeh
    2014 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'14), 2014, : 119 - 124
  • [26] Copy-Move Forgery Detection Using Segmentation
    Bhanu, Bhavya M. P.
    Kumar, Arun M. N.
    PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 224 - 228
  • [27] Survey On Keypoint Based Copy-move Forgery Detection Methods On Image
    Chauhan, Devanshi
    Kasat, Dipali
    Jain, Sanjeev
    Thakare, Vilas
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 206 - 212
  • [28] COPY-MOVE FORGERY DETECTION - A HYBRID APPROACH
    Patel, Jigna J.
    Bhatt, Ninad S.
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2022, 17 (03): : 2000 - 2019
  • [29] Copy-Move Forgery Detection In Digital Image
    Alamro, Loai
    Yusoff, Nooraini
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2016 (ICAST '16), 2016, 1761
  • [30] ON ROTATION INVARIANCE IN COPY-MOVE FORGERY DETECTION
    Christlein, Vincent
    Riess, Christian
    Angelopoulou, Elli
    2010 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2010,