Passive video forgery detection techniques: a survey

Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Mohd. Yamani Idna Idris, Suleman Khan, Zaidi Razak, Muhammad Rezal Kamel Ariffin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

39 Citations (Scopus)

Abstract

Technological advancement of various video and image processing tools has made tempering of digital video easy and faster. This review paper focuses on passive techniques that are employed for detecting forgeries in a digital video. Passive forgery detection techniques are methods used for detecting the authenticity of a video without depending on pre-embedded information. The techniques exploit the use of statistical or mathematical properties that are distorted as a result of video tempering for forgery detection. Passive video forgery detection approach has a great prospect in multimedia security, information security and pattern recognition. In this paper, we divide passive techniques for video forensics into three categories; Statistical correlation of video features, frame-based for detecting statistical anomalies, and the inconsistency features of different digital equipment. The discussion also covers the trends, limitations and idea for improvements of passive forgery detection techniques.
Original languageEnglish
Title of host publication10th International Conference on Information Assurance and Security
PublisherIEEE
Pages29-34
Number of pages6
DOIs
Publication statusPublished - 28 Nov 2014
Externally publishedYes
Event2014 10th International Conference on Information Assurance and Security, IAS 2014 - Okinawa, Japan
Duration: 28 Nov 201430 Nov 2014
https://ieeexplore.ieee.org/xpl/conhome/7058893/proceeding

Workshop

Workshop2014 10th International Conference on Information Assurance and Security, IAS 2014
Country/TerritoryJapan
CityOkinawa
Period28/11/1430/11/14
Internet address

Fingerprint

Dive into the research topics of 'Passive video forgery detection techniques: a survey'. Together they form a unique fingerprint.

Cite this