33
Views
1
CrossRef citations to date
0
Altmetric
Articles

Design of a machine learning layer to optimize forgery detection in videos

&

References

  • Su, L.; Huang, T.; Yang, J. A video forgery recognition calculation dependent on compressive detecting. Multimedia Instruments Appl. 2015, 74, 6641–6656. doi: 10.1007/s11042-014-1915-4
  • Qadir, G., Yahaya, S.; Ho, A.T.S. Surrey college library for criminological investigation (SULFA) of video content. In Proceedings of the IET Conference on Image Processing, London, UK, 3–4 July 2012; pp . 1–6.
  • Zhao, Y.; Pang, T., Liang, X.; Li, Z. Edge cancellation location for static-foundation video dependent on multi-scale common data. In Proceedings of the International Conference on Cloud Computing and Security (ICCCS), Nanjing, China, 16–18 June 2017; pp. 371–384.
  • k-Means Clustering. Accessible online: https://en.wikipedia.org/wiki/K-means_clustering#cite_note-lloyd1957-3.
  • Mulla, M.U., Bevinamarad, P.R. Audit of procedures for the identification of detached video imitations. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2017, 2, 199–203.
  • Wu, Y., Jiang, X., Sun, T., Wang, W. Uncovering video inter-outline forgery dependent on speed field consistency. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, 4–9 May 2014; pp. 2674–2678.
  • Dong, Q.; Yang, G.B.; Zhu, A MCEA based aloof legal sciences plot for recognizing outline-based video altering. Digit. Investing. 2012, 151–159. doi: 10.1016/j.diin.2012.07.002
  • Kang, X.; Liu, J., Liu, H., Wang, Z.J. Crime scene investigation and counter enemy of criminology of video inter-outline forgery. Multimedia Instruments Appl. 2016, 75, 13833–13853. doi: 10.1007/s11042-015-2762-7
  • Han, Y.X.; Sun, T.F., Jiang, X.H. Structure and performance advancement of observation video Inter-outline forgery identification framework. Commun. Technol. 2018, 51, 215–220.
  • Morrone, M.C., Burr, D.C. Highlight location in human vision: A stage subordinate vitality model. Proc. R. Soc. Lond. B 1988, 235, 221–245. doi: 10.1098/rspb.1988.0073
  • Chen, W.; Shi, Y.Q.; Su, W. Picture grafting recognition utilizing 2-D stage congruency and factual snapshots of trademark work. Proc. SPIE 2007, 6505, 65050–65058.
  • Zhang, Z.; Hou, J.; Ma, Q.; Li, Z. Proficient video outline inclusion and erasure discovery dependent on irregularity of connections between’s neighborhood paired example coded outlines. Secur. Commun. Netw. 2015, 8, 311–320. doi: 10.1002/sec.981
  • Mizher, M.A.; Ang, M.C.; Mazhar, An audit of video misrepresenting methods and video forgery location procedures. Int. J. Electron. Secur. Digit. Crime scene investigation 2017, 9, 191–208.
  • Kovesi, P. Picture highlights from stage congruency, J. Comput. Vis. Res. 1999, 1, 1–26.
  • Chao, J., Jiang, X.H., Sun, T.F. A tale video Inter-outline forgery model location plan dependent on optical stream consistency. In Digital Forensics and Watermarking Springer: Berlin, Germany, 2013,pp. 267–281.
  • Zhang, Z., Hou, J., Li, Z., Li, D. Inter-outline forgery location for static-foundation video dependent on MVP consistency. Proc. Lect. Notes Comput. Sci. 2016, 9569, 94–106. doi: 10.1007/978-3-319-31960-5_9
  • Pal, S. K., P. K. Saxena, and S. K. Muttoo. “Steganography and watermarking of digital images using singular value decomposition.” Journal of Discrete Mathematical Sciences and Cryptography 8.3 (2005): 343-353. doi: 10.1080/09720529.2005.10698042
  • Sonal Patil, Dr. K. N. Jariwala, Adaptive Keypoint Selection for Detection of Tampering in Images and Videos, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8S3, June 2019

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.