19
Views
3
CrossRef citations to date
0
Altmetric
Articles

Video tempering detection assessment in full reference mode using difference matrices

&

References

  • Best practices for digital media evidence and digital video forensic evidence, at http://www.videoforensicexpert.com/tag/digital-vid-eo-forensic-evidence/. Accessed 15 January 2014
  • Kobayashi, M., Okabe, T., and Sato, Y., “Detecting Forgery From Static-Scene Video Based on
  • Inconsistency in Noise Level Functions,” IEEE Trans. on Information Forensics and Security, Vol. 5, No. 4, December 2010, pp. 883-892. DOI: 10.1109/TIFS.2010.2074194
  • Bestagini, P., Milani, S., Tagliasacchi, M., and Tubaro, S., “Local tampering detection in video sequences,”in Proc. IEEE International Workshop on Multimedia Signal Processing, Pula, Italy, September 2013
  • Poonia, Ramesh C. “A performance evaluation of routing protocols for vehicular ad hoc networks with swarm intelligence.” International Journal of System Assurance Engineering and Management 9.4 (2018): 830-835 doi: 10.1007/s13198-017-0661-1
  • Eswaraprasad, Ramkumar, and Linesh Raja. “A review of virtual machine (VM) resource scheduling algorithms in cloud computing environment.” Journal of Statistics and Management Systems 20.4 (2017): 703-711 doi: 10.1080/09720510.2017.1395190
  • Kakar, P. and Natarajan, S., “Exposing Postprocessed Copy–Paste Forgeries Through Transform-InvariantFeatures,” IEEE Trans. on Information Forensics and Security, Vol. 7, No.3, June 2012, pp. 1018-1028. DOI: 10.1109/TIFS.2012.2188390
  • Raja, Linesh, and Sonali Vyas. “The Study of Technological Development in the Field of Smart Farming.” Smart Farming Technologies for Sustainable Agricultural Development. IGI Global, 2019. 1-24.
  • Andrews, Leo John Baptist, and Linesh Raja. “A study on m-health inline with the sensors applying for a real time environment.” Journal of Statistics and Management Systems 20.4 (2017): 659-667 doi: 10.1080/09720510.2017.1395186
  • Rekhis, S. and Boudriga, N., “A System for Formal Digital Forensic Investigation Aware of Anti-forensicAttacks,” IEEE Trans. on Information Forensics and Security, Vol. 7, No. 2, April 2012, pp. 635-650. DOI:10.1109/TIFS.2011.2176117
  • Stamm, M.C., Lin, W.S., and Liu, K.J.R., “Temporal Forensics and Anti-Forensics for Motion CompensatedVideo,” IEEE Trans. on Information Forensics and Security, Vol. 7, No. 4, August 2012, pp. 1315-1329. DOI: 10.1109/TIFS.2012.2205568

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.