Video content authentication techniques: a comprehensive survey
暂无分享,去创建一个
[1] H. Woodrow,et al. : A Review of the , 2018 .
[2] Alireza Behrad,et al. Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects , 2017, Multimedia Tools and Applications.
[3] Zulfiqar Habib,et al. Copy-move and splicing image forgery detection and localization techniques: a review , 2017 .
[4] Xingming Sun,et al. Detecting video frame rate up-conversion based on frame-level analysis of average texture variation , 2017, Multimedia Tools and Applications.
[5] Bin Li,et al. Automatic Detection of Object-Based Forgery in Advanced Video , 2016, IEEE Transactions on Circuits and Systems for Video Technology.
[6] Z. Jane Wang,et al. Forensics and counter anti-forensics of video inter-frame forgery , 2016, Multimedia Tools and Applications.
[7] Heejo Lee,et al. Integrity verification of the ordered data structures in manipulated video content , 2016, Digit. Investig..
[8] K. Sitara,et al. Digital video tampering detection: An overview of passive techniques , 2016, Digit. Investig..
[9] Mo Chen,et al. Effect of Compression on Sensor-Fingerprint Based Camera Identification , 2016, Media Watermarking, Security, and Forensics.
[10] Xingming Sun,et al. Detecting video frame-rate up-conversion based on periodic properties of edge-intensity , 2016, J. Inf. Secur. Appl..
[11] Raahat Devender Singh,et al. Detection of re-compression, transcoding and frame-deletion for digital video authentication , 2015, 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS).
[12] Davide Cozzolino,et al. Video forgery detection and localization based on 3D patchmatch , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[13] Min-Kuan Chang,et al. Forensic and anti-forensic techniques for video shot editing in H.264/AVC , 2015, J. Vis. Commun. Image Represent..
[14] Vaishali Joshi,et al. Tampering detection in digital video - a review of temporal fingerprints based techniques , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).
[15] Shahrokh Ghaemmaghami,et al. Detection of regional copy/move forgery in MPEG videos using optical flow , 2015, 2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP).
[16] Anu Mehra,et al. Video authentication in digital forensic , 2015, 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE).
[17] Yun Q. Shi,et al. Inter-frame Video Forgery Detection Based on Block-Wise Brightness Variance Descriptor , 2014, IWDW.
[18] Davide Cozzolino,et al. Image forgery detection through residual-based local descriptors and block-matching , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[19] Sanjay Kumar Singh,et al. Passive copy-move forgery detection in videos , 2014, 2014 International Conference on Computer and Communication Technology (ICCCT).
[20] Jiwu Huang,et al. Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity , 2014, Multimedia tools and applications.
[21] M. Jaffar,et al. Rician noise removal from MR images using novel adapted selective non-local means filter , 2014, Multimedia tools and applications.
[22] Jiwu Huang,et al. Exposing Fake Bit Rate Videos and Estimating Original Bit Rates , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[23] Jyh-Jong Tsay,et al. A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis , 2014, Digit. Investig..
[24] Hongmei Liu,et al. Detecting Frame Deletion in H.264 Video , 2014, ISPEC.
[25] Mauro Barni,et al. A video forensic technique for detecting frame deletion and insertion , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[26] Yuxing Wu,et al. Exposing video inter-frame forgery based on velocity field consistency , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[27] Qi Wang,et al. Video Inter-Frame Forgery Identification Based on Consistency of Correlation Coefficients of Gray Values , 2014 .
[28] Yang Gaobo,et al. Detection of object-based manipulation by the statistical features of object contour. , 2014, Forensic science international.
[29] Mauro Barni,et al. Countering anti-forensics by means of data fusion , 2014, Electronic Imaging.
[30] S. P. Ghrera,et al. Pixel-Based Image Forgery Detection: A Review , 2014 .
[31] Tamer Shanableh,et al. Detection of frame deletion for digital video forensics , 2013, Digit. Investig..
[32] Pier Luigi Dragotti,et al. Modelling radial distortion chains for video recapture detection , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[33] David Vazquez-Padin,et al. Localization of forgeries in MPEG-2 video through GOP size and DQ analysis , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[34] Paolo Bestagini,et al. Local tampering detection in video sequences , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[35] Sonja Grgic,et al. CoMoFoD — New database for copy-move forgery detection , 2013, Proceedings ELMAR-2013.
[36] Patrick Pérez,et al. Towards fast, generic video inpainting , 2013, CVMP '13.
[37] Shilin Wang,et al. Identifying Video Forgery Process Using Optical Flow , 2013, IWDW.
[38] Weiyao Lin,et al. Survey on blind image forgery detection , 2013, IET Image Processing.
[39] Vijay H. Mankar,et al. Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..
[40] Jiwu Huang,et al. Exposing fake bitrate video and its original bitrate , 2013, 2013 IEEE International Conference on Image Processing.
[41] Paolo Bestagini,et al. Video recapture detection based on ghosting artifact analysis , 2013, 2013 IEEE International Conference on Image Processing.
[42] Heung-Kyu Lee,et al. Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise , 2013, Sensors.
[43] Zhang Xiong,et al. A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[44] Paolo Bestagini,et al. Detection of temporal interpolation in video sequences , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[45] Min Wu,et al. Information Forensics: An Overview of the First Decade , 2013, IEEE Access.
[46] Mauro Barni,et al. A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence , 2013, IEEE Transactions on Information Forensics and Security.
[47] Yun Q. Shi,et al. Detection of Double Compression in MPEG-4 Videos Based on Markov Statistics , 2013, IEEE Signal Processing Letters.
[48] Gopu Darsan,et al. Blind Detection Method for Video Inpainting Forgery , 2012 .
[49] David Vazquez-Padin,et al. Detection of video double encoding with GOP size estimation , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[50] Pier Luigi Dragotti,et al. Video jitter analysis for automatic bootleg detection , 2012, 2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP).
[51] Gaobo Yang,et al. A MCEA based passive forensics scheme for detecting frame-based video tampering , 2012, Digit. Investig..
[52] Xinghao Jiang,et al. A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency , 2012, IWDW.
[53] Paolo Bestagini,et al. Multiple compression detection for video sequences , 2012, 2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP).
[54] K. J. Ray Liu,et al. Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.
[55] Paolo Bestagini,et al. An overview on video forensics , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[56] Yuting Su,et al. Detection of video transcoding for digital forensics , 2012, 2012 International Conference on Audio, Language and Image Processing.
[57] Anthony T. S. Ho,et al. Surrey University Library for Forensic Analysis (SULFA) of video content , 2012 .
[58] Girija Chetty,et al. A novel image watermarking scheme using Extreme Learning Machine , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).
[59] Xinghao Jiang,et al. Exposing video forgeries by detecting MPEG double compression , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[60] Srinivas Mukkamala,et al. Novel Blind Video Forgery Detection Using Markov Models on Motion Residue , 2012, ACIIDS.
[61] James F. O'Brien,et al. Exposing Digital Forgeries in Ballistic Motion , 2012, IEEE Transactions on Information Forensics and Security.
[62] Stefano Tubaro,et al. Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.
[63] Girija Chetty,et al. Blind Video Tamper Detection Based on Fusion of Source Features , 2011, 2011 International Conference on Digital Image Computing: Techniques and Applications.
[64] Anderson Rocha,et al. Video Phylogeny: Recovering near-duplicate video relationships , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[65] Mauro Barni,et al. A Dempster-Shafer framework for decision fusion in image forensics , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[66] Heung-Kyu Lee,et al. Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity , 2011, IWDW.
[67] Anderson Rocha,et al. Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.
[68] Weizhi Nie,et al. A frame tampering detection algorithm for MPEG videos , 2011, 2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference.
[69] Guo-Shiang Lin,et al. Detecting frame duplication based on spatial and temporal analyses , 2011, 2011 6th International Conference on Computer Science & Education (ICCSE).
[70] K. J. Ray Liu,et al. Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.
[71] Stefano Tubaro,et al. The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[72] K. J. Ray Liu,et al. Anti-forensics for frame deletion/addition in MPEG video , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[73] Simon Tjoa,et al. Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art , 2011, 2011 Sixth International Conference on IT Security Incident Management and IT Forensics.
[74] Mo Chen,et al. Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Transactions on Information Forensics and Security.
[75] K. J. Ray Liu,et al. Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.
[76] K. J. Ray Liu,et al. Wavelet-based image compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.
[77] Anderson Rocha,et al. First steps toward image phylogeny , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[78] J Granty Regina Elwin,et al. Survey on passive methods of image tampering detection , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).
[79] Takahiro Okabe,et al. Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions , 2010, IEEE Transactions on Information Forensics and Security.
[80] Heung-Kyu Lee,et al. Screenshot identification using combing artifact from interlaced video , 2010, MM&Sec '10.
[81] Yao Zhao,et al. Anti-forensics of contrast enhancement in digital images , 2010, MM&Sec '10.
[82] Girija Chetty,et al. Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features , 2010, 2010 Fourth International Conference on Network and System Security.
[83] Girija Chetty,et al. Blind and passive digital video tamper detection based on multimodal fusion , 2010, ICC 2010.
[84] Babak Mahdian,et al. A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..
[85] Yuting Su,et al. Detection of Double-Compression in MPEG-2 Videos , 2010, 2010 2nd International Workshop on Intelligent Systems and Applications.
[86] K. J. Ray Liu,et al. Anti-forensics of JPEG compression , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[87] Mauro Barni,et al. Exploring image dependencies: a new challenge in image forensics , 2010, Electronic Imaging.
[88] Jie Liu,et al. Exposing Digital Video Forgery by Detecting Motion-Compensated Edge Artifact , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.
[89] Yu Zhou,et al. D-S Evidence Theory Based Digital Image Trustworthiness Evaluation Model , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[90] Jing Zhang,et al. Exposing digital video forgery by ghost shadow artifact , 2009, MiFor '09.
[91] Yun Q. Shi,et al. Detection of Double MPEG Compression Based on First Digit Statistics , 2009, IWDW.
[92] Weihong Wang,et al. Exposing digital forgeries in video by detecting double quantization , 2009, MM&Sec '09.
[93] Eli Shechtman,et al. PatchMatch: a randomized correspondence algorithm for structural image editing , 2009, ACM Trans. Graph..
[94] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[95] Pin Zhang,et al. Detecting Image Tampering Using Feature Fusion , 2009, 2009 International Conference on Availability, Reliability and Security.
[96] Rainer Böhme,et al. Synthesis of color filter array pattern in digital images , 2009, Electronic Imaging.
[97] Rainer Böhme,et al. Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.
[98] Weihong Wang,et al. Detecting Re-projected Video , 2008, Information Hiding.
[99] Chia-Wen Lin,et al. Video forgery detection using correlation of noise residue , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[100] Shih-Fu Chang,et al. Statistical fusion of multiple cues for image tampering detection , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.
[101] B. Mahdian,et al. Blind methods for detecting image fakery , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.
[102] Zhen Zhang,et al. A survey on passive-blind image forgery by doctor method detection , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[103] Min Wu,et al. MPEG recompression detection based on block artifacts , 2008, Electronic Imaging.
[104] Nikos Komodakis,et al. Image Completion Using Efficient Belief Propagation Via Priority Scheduling and Dynamic Pruning , 2007, IEEE Transactions on Image Processing.
[105] Weihong Wang,et al. Exposing digital forgeries in video by detecting duplication , 2007, MM&Sec.
[106] Weihong Wang,et al. Exposing Digital Forgeries in Interlaced and Deinterlaced Video , 2007, IEEE Transactions on Information Forensics and Security.
[107] Alexei A. Efros,et al. Scene completion using millions of photographs , 2008, Commun. ACM.
[108] Lu Yuan,et al. Image deblurring with blurred/noisy image pairs , 2007, ACM Trans. Graph..
[109] Mohan S. Kankanhalli,et al. A Survey on Digital Camera Image Forensic Methods , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[110] Pan Feng,et al. A survey of passive technology for digital image forensics , 2007 .
[111] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[112] Mauro Barni,et al. Detection of malevolent changes in digital video for forensic applications , 2007, Electronic Imaging.
[113] Guillermo Sapiro,et al. Video Inpainting Under Constrained Camera Motion , 2007, IEEE Transactions on Image Processing.
[114] Hany Farid,et al. Digital doctoring: how to tell the real from the fake , 2006 .
[115] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[116] Nasir D. Memon,et al. Image manipulation detection , 2006, J. Electronic Imaging.
[117] Weihong Wang,et al. Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.
[118] Xiaochun Cao,et al. Video Completion for Perspective Camera Under Constrained Motion , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[119] Stamatios V. Kartalopoulos,et al. Proceedings of the 9th WSEAS International Conference on Communications , 2005 .
[120] Patrick Pérez,et al. Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.
[121] Irfan A. Essa,et al. Graphcut textures: image and video synthesis using graph cuts , 2003, ACM Trans. Graph..
[122] Patrick Pérez,et al. Poisson image editing , 2003, ACM Trans. Graph..
[123] Yoshinori Akao,et al. Discrimination of inkjet-printed counterfeits by spur marks and feature extraction by spatial frequency analysis , 2002, IS&T/SPIE Electronic Imaging.
[124] Kenji Kurosawa,et al. CCD fingerprint method-identification of a video camera from videotaped images , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[125] Arthur P. Dempster,et al. Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.
[126] R. Fisher. THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .
[127] Ainuddin Wahid Abdul Wahab,et al. Passive video forgery detection techniques: A survey , 2014, 2014 10th International Conference on Information Assurance and Security.
[128] D. Xiao,et al. An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules , 2014, Multimedia Tools and Applications.
[129] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[130] C.-C. Jay Kuo,et al. Current Developments and Future Trends in Audio Authentication , 2012, IEEE MultiMedia.
[131] Yuting Su,et al. Detection of Blue Screen Special Effects in Videos , 2012 .
[132] Carsten Rother,et al. PatchMatch Stereo - Stereo Matching with Slanted Support Windows , 2011, BMVC.
[133] Christian Riess,et al. A Study on Features for the Detection of Copy-Move Forgeries , 2010, Sicherheit.
[134] Girija Chetty,et al. Nonintrusive Image Tamper Detection Based on Fuzzy Fusion , 2010 .
[135] Weihong Wang,et al. Digital video forensics , 2009 .
[136] H. Farid. A Survey of Image Forgery Detection , 2008 .
[137] Jiwu Huang,et al. A survey of passive technology for digital image forensics , 2007, Frontiers of Computer Science in China.
[138] Husrev T. Sencar,et al. Overview of State-of-the-Art in Digital Image Forensics , 2007 .
[139] Shih-Fu Chang,et al. Passive-blind Image Forensics , 2006 .