Passive forensics for video object removal tampering

Firstly, the concept and importance of digital video object removal tampering forensics were introduced. Then, several current passive forensics algorithms for object removal tampering were selected and divided into two categories that based on correlation analysis and based on machine learning algo...

Full description

Bibliographic Details
Main Author: Ye YAO,Wei-tong HU,Yi-zhi REN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00123
_version_ 1811256642834006016
author Ye YAO,Wei-tong HU,Yi-zhi REN
author_facet Ye YAO,Wei-tong HU,Yi-zhi REN
author_sort Ye YAO,Wei-tong HU,Yi-zhi REN
collection DOAJ
description Firstly, the concept and importance of digital video object removal tampering forensics were introduced. Then, several current passive forensics algorithms for object removal tampering were selected and divided into two categories that based on correlation analysis and based on machine learning algorithm according to development trends. The selected passive forensics algorithms were introduced in detail. Finally, some possible research trends in video object removal tampering detections in the future were looked forward to.
first_indexed 2024-04-12T17:43:33Z
format Article
id doaj.art-6c2cf5d1536f4a2791d2364459896a96
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-04-12T17:43:33Z
publishDate 2017-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-6c2cf5d1536f4a2791d2364459896a962022-12-22T03:22:44ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-02-0132465210.11959/j.issn.2096-109x.2017.00123Passive forensics for video object removal tamperingYe YAO,Wei-tong HU,Yi-zhi REN 0School of CyberSpace Security, Hangzhou Dianzi University, Hangzhou 310018, ChinaFirstly, the concept and importance of digital video object removal tampering forensics were introduced. Then, several current passive forensics algorithms for object removal tampering were selected and divided into two categories that based on correlation analysis and based on machine learning algorithm according to development trends. The selected passive forensics algorithms were introduced in detail. Finally, some possible research trends in video object removal tampering detections in the future were looked forward to.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00123digital video forensicsvideo object tamperingtampering detectionpassive forensics
spellingShingle Ye YAO,Wei-tong HU,Yi-zhi REN
Passive forensics for video object removal tampering
网络与信息安全学报
digital video forensics
video object tampering
tampering detection
passive forensics
title Passive forensics for video object removal tampering
title_full Passive forensics for video object removal tampering
title_fullStr Passive forensics for video object removal tampering
title_full_unstemmed Passive forensics for video object removal tampering
title_short Passive forensics for video object removal tampering
title_sort passive forensics for video object removal tampering
topic digital video forensics
video object tampering
tampering detection
passive forensics
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00123
work_keys_str_mv AT yeyaoweitonghuyizhiren passiveforensicsforvideoobjectremovaltampering