89
Views
4
CrossRef citations to date
0
Altmetric
Articles

Video security against deepfakes and other forgeries

, , &

References

  • D. Kahneman, A. Tversky, “Prospect Theory, an analysis of decision under risk”, The Economic Society, 1979.
  • J. Taylor, “Iraqi torture photographs and documentary realism in the press”, Taylor and Francis, 2017.
  • G. Sharma, “Video tempering detection assessment in full reference mode using difference matrices”, Taylor and Francis, 2019.
  • R. D. Singh, N. Aggarwal “Video content authentication techniques: a comprehensive survey”, Springer, 2017.
  • A. De, H. Chadha and S. Gupta, “Detection of forgery in digital video” In: Proceedings of 10th World Multi Conference on Systems, Cybernetics and Informatics. V, 2006, pp. 229–233.
  • W. Wang, H. Farid, “Exposing digital forgeries in video by detecting double MPEG compression”. In: Voloshynovskiy, S., Dittmann, J., Fridrich, J.J. (eds.) Proceedings of 8th Workshop on Multimedia and Security (MM&Sec’06). ACM Press, New York, NY, pp. 37–47, 2006.
  • N.D. Menon, E.J. Delp, P.W. Wong and J. Dittmann: “MPEG recompression detection based on block artifacts.” Proceedings of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Vol. 6819, 2008, San Jose, CA.
  • Lin, Chin-Tsai, Che-Wei Chang, and Yu-Jen Lin. “Grey relational analysis evaluation of digital video recorder.” Journal of Information and Optimization Sciences 26.1 (2005): 123-133. doi: 10.1080/02522667.2005.10699638
  • X. Yang, Y. Li and S. Lyu, “Exposing Deep Fakes Using Inconsistent Head Poses,” ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, United Kingdom, pp. 8261-8265.
  • T. Mantoro, M. A. Ayu and Suhendi, “Multi-Faces Recognition Process Using Haar Cascades and Eigenface Methods”, 6t h International Conference on Multimedia Computing and Systems (ICMCS), 2018, Rabat, pp. 1-5.
  • R. Munir, “A Chaos-based Fragile Watermarking Method in Spatial Domain for Image Authentication”, in 2015 International Seminar on Intelligent Technology and Its Applications (ISITIA), IEEE, 2015, pp.225-229.
  • V. Santhi and Dr. A. Thangavelu, “DWT-SVD Combined Full Band Robust Watermarking Technique for Color Images in YUV Color Space”, International Journal of Image, Graphics and Signal Processing (IJIGSP), 2012.
  • X. Yu, C. Wang, and X. Zhou, “Review on semi-fragile watermarking algorithms for content authentication of digital images”, Future Internet, 2017.
  • H. Yang, X.M. Sun, G. Sun, “A semi-fragile watermarking algorithm using adaptive least significant bit substitution”, Information Technology Journal, 2010.
  • C.I. Podilchuk and E.J. Delp, “Digital watermarking: algorithms and applications,” in IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33-46, July 2001. doi: 10.1109/79.939835
  • H. Agarwall, R. Ahuja, S.S. Bedi, “Highly Robust and Imperceptible Luminance Based Hybrid Digital Video Watermarking Scheme for Ownership Protection”, International Journal of Image, Graphics and Signal Processing (IJIGSP), 2012.
  • H.S. Fadewar, “Face Recognition: A Holistic Approach Review”, IEEE, 2013.
  • A. Sharifara, M.S. Mohd Rahim and Y. Anisi “A general review of human face detection including a study of neural networks and Haar feature-based cascade classifier in face detection”, International Symposium on Biometrics and Security Technologies (ISBAST), 2014, Kuala Lumpur, pp. 73-78.
  • X. Zhao and C. Wei, “A real-time face recognition system based on the improved LBPH algorithm”, 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP), Singapore, pp. 72-76.
  • A.M. Abdullah and R.H.H. Aziz, “Advanced Encryption Standard (AES) algorithm to encrypt and decrypt data”, International Journal of Computer Science, 2016.
  • Kumar, Ankit, et al. “An enhanced quantum key distribution protocol for security authentication.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 499-507. doi: 10.1080/09720529.2019.1637154

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.