Passive forensics for video object removal tampering
Firstly, the concept and importance of digital video object removal tampering forensics were introduced. Then, several current passive forensics algorithms for object removal tampering were selected and divided into two categories that based on correlation analysis and based on machine learning algo...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00123 |
_version_ | 1811256642834006016 |
---|---|
author | Ye YAO,Wei-tong HU,Yi-zhi REN |
author_facet | Ye YAO,Wei-tong HU,Yi-zhi REN |
author_sort | Ye YAO,Wei-tong HU,Yi-zhi REN |
collection | DOAJ |
description | Firstly, the concept and importance of digital video object removal tampering forensics were introduced. Then, several current passive forensics algorithms for object removal tampering were selected and divided into two categories that based on correlation analysis and based on machine learning algorithm according to development trends. The selected passive forensics algorithms were introduced in detail. Finally, some possible research trends in video object removal tampering detections in the future were looked forward to. |
first_indexed | 2024-04-12T17:43:33Z |
format | Article |
id | doaj.art-6c2cf5d1536f4a2791d2364459896a96 |
institution | Directory Open Access Journal |
issn | 2096-109X |
language | English |
last_indexed | 2024-04-12T17:43:33Z |
publishDate | 2017-02-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj.art-6c2cf5d1536f4a2791d2364459896a962022-12-22T03:22:44ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-02-0132465210.11959/j.issn.2096-109x.2017.00123Passive forensics for video object removal tamperingYe YAO,Wei-tong HU,Yi-zhi REN 0School of CyberSpace Security, Hangzhou Dianzi University, Hangzhou 310018, ChinaFirstly, the concept and importance of digital video object removal tampering forensics were introduced. Then, several current passive forensics algorithms for object removal tampering were selected and divided into two categories that based on correlation analysis and based on machine learning algorithm according to development trends. The selected passive forensics algorithms were introduced in detail. Finally, some possible research trends in video object removal tampering detections in the future were looked forward to.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00123digital video forensicsvideo object tamperingtampering detectionpassive forensics |
spellingShingle | Ye YAO,Wei-tong HU,Yi-zhi REN Passive forensics for video object removal tampering 网络与信息安全学报 digital video forensics video object tampering tampering detection passive forensics |
title | Passive forensics for video object removal tampering |
title_full | Passive forensics for video object removal tampering |
title_fullStr | Passive forensics for video object removal tampering |
title_full_unstemmed | Passive forensics for video object removal tampering |
title_short | Passive forensics for video object removal tampering |
title_sort | passive forensics for video object removal tampering |
topic | digital video forensics video object tampering tampering detection passive forensics |
url | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00123 |
work_keys_str_mv | AT yeyaoweitonghuyizhiren passiveforensicsforvideoobjectremovaltampering |