Computer Science ›› 2025, Vol. 52 ›› Issue (8): 363-373.doi: 10.11896/jsjkx.250500051
• Information Security • Previous Articles Next Articles
WANG Kangqing1, XIA Likuan2, LI Shuo3
CLC Number:
[1]SINGH R D,AGGARWAL N.Video Content Authentication Techniques:A Comprehensive Surve[J].Multimedia Systems,2018,2(24):211-240. [2]WANG W,FARID H.Exposing Digital Forgeries in Video by Detecting Double Quantization[C]//ACM Workshop Mutimedia Security.New York:ACM,2009:9-48. [3]SU Y,JING Z,JIE L.Exposing Digital Video Forgery by Detecting Motion-Compensated Edge Artifact[C]//Computational Intelligence and Software Engineering.2010:37-47. [4]VAZQUEZPADIN D,FONTANI M,BIANCHI T.Detection of video double encoding with GOP size estimation[C]//IEEE International Workshop on Information Forensics and Security.2012:151-156. [5]FENG C,XU Z,JIA S,et al.Motion-Adaptive Frame Deletion Detection for Digital Video Forensics[J].IEEE Transactions on Circuits and Systems for Video Technology,2017,27(12):2543-2554. [6]SHANABLEH T.Detection of Frame Deletion for Digital Video Forensics[J].Digital Investigation,2013,4(10):350-360. [7]ZHANG Z,HOU J,LI Z.Efficient Video Frame Insertion and Deletion Detection Based on Inconsistency of Correlations between Local Binary Pattern Coded Frames[J].Security and Communication Networks,2017,8(2):311-320. [8]ZHAO Y,PANG T,LIANG X,et al.Frame Deletion Detection for Static-Background Video Based on Multi-scale Mutual Information[C]//Cloud Computing and Security:Third International Conference.2017:371-384. [9]ZHANG Z Z,HOU J J,LI Z H,et al.Video frame-interpolation and frame-deletion forgery detection based on MSSIM quotient consistency[J].Journal of Beijing University of Posts and Telecommunications,2015,38(4):84-88. [10]LIU Y,HUANG T.Exposing Video Inter-Frame Forgery byZernike Opponent Chromaticity Moments and Coarseness Analysis[J].Multimedia Systems,2017,2(23):223-238. [11]CONOTTER V,O'BRIEN J F,FARID H.Exposing Digital Forgeries in Ballistic Motion [J].IEEE Transactions on Information Forensics and Security,2012,7(1):283-296. [12]CHAO J,JIANG X,SUN T.A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow Consistency [C]//International Workshop on Digital Watermarking.Berlin:Springer,2012:267-281. [13]WANG W,JIANG X,WANG S.Identifying Video ForgeryProcess Using Optical Flow [C]//International Workshop on Digital Watermarking.Berlin:Springer, 2014:244-257. [14]LI S,HUO H T.Frame Deletion Detection Based on OpticalFlow Orientation Variation[J].IEEE Access,2021,99:37196-37209. [15]BAO Q,WANG Y,HUA H,et al.An anti-forensics video forgery detection method based on noise transfer matrix analysis[J].Sensors,2024,24(16):5341. [16]GOWDA R,PAWAR D.Deep learning-based forgery identification and localization in videos[J].Signal,Image and Video Processing,2023,17:2185-2192. [17]LI S,HUO H T.Continuity-Attenuation Captured Network for Frame Deletion Detection[J].Signal,Image and Video Process,2024,18(4):3285-3297. [18]FENG C,WU D,WU T,et al.An MSDCNN-LSTM Framework for Video Frame Deletion Forensics[J].Multimedia Tools and Applications,2024,83:72745-72764. [19]YI D H.Time Series Analysis:Forecasting and Control [J].Application of Statistics and Management,2000(3):51. [20]HU Y,SALMAN A.Construction and testing of video tamper detection database[J].Journal of South China University of Technology(Natural Science Edition),2017,45:57-64. |
[1] | XIE Bai-lin, LI Qi, KUANG Jiang. Microblog Popular Information Detection Based on Hidden Semi-Markov Model [J]. Computer Science, 2022, 49(6A): 291-296. |
[2] | LUO Jing-jie, WANG Yong-li. ADCSM:A Fine-grained Driving Cycle Model Construction Method [J]. Computer Science, 2021, 48(6A): 289-294. |
[3] | MA Chuang, YUAN Ye and YOU Hai-sheng. Agricultural Product Output Forecasting Method Based on Grey-Markov Model [J]. Computer Science, 2020, 47(6A): 535-539. |
[4] | ZHANG Cheng-wei, LUO Feng-e, DAI Yi. Prediction Method of Flight Delay in Designated Flight Plan Based on Data Mining [J]. Computer Science, 2020, 47(11A): 464-470. |
[5] | ZHANG Jing, YANG Jian, SU Peng. Survey of Monosyllable Recognition in Speech Recognition [J]. Computer Science, 2020, 47(11A): 172-174. |
[6] | JIA Zhi-chun, LI Xiang, YU Zhan-lin, LU Yuan, XING Xing. QoS Satisfaction Prediction of Cloud Service Based on Second Order Hidden Markov Model [J]. Computer Science, 2019, 46(9): 321-324. |
[7] | WU Jian-wei, LI Yan-ling, ZHANG Hui, ZANG Han-lin. HMM Cooperative Spectrum Prediction Algorithm Based on Density Clustering [J]. Computer Science, 2018, 45(9): 129-134. |
[8] | YUE Xin, DU Jun-wei, HU Qiang, WANG Yan-ping. Fault Tree Structure Matching Algorithm and Its Application [J]. Computer Science, 2018, 45(9): 202-206. |
[9] | GONG Fa-ming,ZHU Peng-hai. Word Segmentation Based on Adaptive Hidden Markov Model in Oilfield [J]. Computer Science, 2018, 45(6A): 97-100. |
[10] | TONG Zhen-ming, LIU Zhi-peng. Next Place Prediction of Massively Multiplayer Online Role-playing Games [J]. Computer Science, 2018, 45(11A): 453-457. |
[11] | CHEN Bing-cai, WANG Xi-bao, YU Chao, NIAN Mei, TAO Xin, PAN Wei-min, LU Zhi-mao. Saliency Detection Based on Surroundedness and Markov Model [J]. Computer Science, 2018, 45(10): 272-275. |
[12] | XU Guang-gen, YANG Lu and YAN Jian-feng. Sparse Trajectory Destination Prediction Algorithm Based on Markov Model [J]. Computer Science, 2017, 44(8): 193-197. |
[13] | YANG Lu, YU Shou-wen and YAN Jian-feng. Type-2 Fuzzy Logic Based Multi-threaded Data Race Detection [J]. Computer Science, 2017, 44(12): 135-143. |
[14] | LUO Feng-e, ZHANG Cheng-wei and LIU An. Flight Delays Early Warning Management and Analysis Based on Data Mining [J]. Computer Science, 2016, 43(Z6): 542-546. |
[15] | LI Wei-lin, WEN Jian and MA Wen-kai. Speech Recognition System Based on Deep Neural Network [J]. Computer Science, 2016, 43(Z11): 45-49. |
|