A Review : Video Tampering Attacks and Detection Techniques

Authors

  • Ruksana Habeeb  M Tech Student, Department of CSE, Musaliar College of Engineering & Technology, Pathanamthitta, Kerala, India
  • Dr. L. C. Manikandan  Professor and Hod, Department of CSE, Musaliar College of Engineering & Technology, Pathanamthitta, Kerala, India

DOI:

https://doi.org//10.32628/CSEIT195524

Keywords:

Active and Passive Techniques, Copy-Move Forgery, Support Vector Machine, Spatial and Temporal Tampering , Video Forgery Detection, Watermarking, Video Authentication, Digital Signature

Abstract

Technological advancements of various video and image editing tools has reached such a level that the tampering of digital video or image can be performed easily without degrading their quality or leaving any visual evidence. This review paper presents an overview of various types of video forgery and the different types of techniques that are employed for its detection. Passive and active forgery detection techniques are commonly used methods for detecting the tampering in a digital video. Passive and active tampering detection techniques are utilized for detecting the integrity as well as the authenticity of a given video. The aim of this review is to provide some productive information about video tampering attacks for upcoming researchers.

References

  1. Omar Ismael Al-Sanjary , Ahmed Abdullah Ahmed, Hawar Bahzad Ahmad, Musab A. M Ali1, M.N. Mohammed1,Muhammad Irsyad Abdullah1, Zurida Binti Ishak1(2018), “Deleting Object in Video Copy-Move Forgery Detection Based on Optical Flow Concept”, 2018 IEEE Conference on Systems,Process and Control (ICSPC 2018),pp. 14-15.
  2. RaahatDevenderSingh1 ,Naveen Aggarwal(2018), “Video content authentication techniques: a comprehensive survey”, Multimedia Systems, Springer-Verlag Berlin Heidelberg, pp.211-240
  3. Omar Ismael Al-Sanjary, Ghazali Sulong (2015),” DETECTION OF VIDEO FORGERY: A REVIEW OF LITERATURE”, Journal of Theoretical and Applied Information Technology ,pp.207-220
  4. Rohini Sawant, Manoj Sabnis (2018)"A Review of Video Forgery and Its Detection" ,IOSR Journal of Computer Engineering (IOSR-JCE) 20.2: 01-04.
  5. Mrs. J.D. Gavade,Mrs. S.R. Chougule. (2015),” Review of Techniques of Digital Video Forgery Detection”, Advances in Computer Science and Information Technology (ACSIT), Volume 2 , pp.233-236
  6. Ainuddin Wahid Abdul Wahab, M. A. (2014),” Passive Video Forgery Detection Techniques: A Survey”, 10th International Conference on Information Assurance and Security. IEEE
  7. Gironi, A., M. Fontani, Tiziano Bianchi, A. Piva, and M. Barni(2014), "A video forensic technique for detecting frame deletion and insertion", In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6226-6230
  8. Subramanyam, A. V., and Sabu Emmanuel(2013),"Pixel estimation based video forgery detection.", In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3038-3042
  9. Gopal Prasad, Atul Kumar Singh, Arun Kumar Mishra(2013),”Digital Video Watermarking Techniques and Comparative Analysis : A Review”, International Journal of Engineering Research &Technology (IJERT), vol. 2, pp. 2041-2046
  10. Chao, Juan, Xinghao Jiang, and Tanfeng Sun(2013), "A novel video inter-frame forgery model detection scheme based on optical flow consistency", Digital Forensics and Watermaking. Springer Berlin Heidelberg, pp. 267-281.
  11. Saurabh Upadhyay, Sanjay Kumar Singh(2012),“Video Authentication: Issues and Challenges” , IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012 ISSN (Online):1694-0814
  12. D. Qiong, Y. Gaobo, Z. Ningbo, (2012). “A MCEA based passive forensics scheme for detecting frame-based video Tampering”, Digital Investigation. Journal of Elsevier pp. 151-17
  13. S. Milaniet al.,(2012) “An overview on video forensics,” APSIPA Trans. Signal
  14. Stamm, Matthew C., W. Sabrina Lin, and KJ Ray Liu(2012), "Temporal forensics and anti-forensics for motion compensated video", Information Forensics and Security, IEEE Transactions on 7.4 (2012): 1315-1329
  15. Chuang Weihong, Su Hui, Wu Min(2011),” Exploiting compression effects forimproved source camera identification using strongly compressed video”, In Proceedings of IEEE Conference on Image Processing (ICIP),1953-1956
  16. V. Conotter, J. O’Brien, and H. Farid(2011), “Exposing digital forgeries in ballistic motion,” Information Forensics and Security, IEEE Transactions on, vol. PP, no. 99, pp. 1.
  17. Rocha Anderson, Scheirer Walter, Boult Terrance, Goldenstein Siome(2011),“Vision of the unseen: current trends and challenges in digital image and video forensics”, ACM Computing Surveys 2011;43(4):26-40
  18. Michihiro Kobayashi, Takahiro Okabe, and Yoichi Sato (2010),“Detecting forgery from static-scene video based on inconsistency in noise level functions,” IEEE Transactions on Information Forensics and Security, vol. 5, pp. 883-892.
  19. Jamal Hussein and Aree Mohammed (2009), “Robust Video Watermarking using Multi-Band Wavelet Transform", IJCSI International Journal of Computer Science Issues, Vol. 6, No. 1.
  20. S. Upadhyay , S.K. Singh, M. Vatsa, and R. Singh(2007), “Video authentication using relative correlation information and SVM”, In Computational Intelligence in Multimedia Processing: Recent Advances (Springer Verlag) Edited by A.E. Hassanien, J. Kacprzyk, and A. Abraham, 2007.
  21. N. Mondaini, R. Caldelli, A. Piva, M. Barni, and V. Cappellini(2007),“Detection of malevolent changes in digital video for forensic applications,” in Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX.
  22. Weihong Wang and Hany Farid (2006), “Exposing digital forgeries in video by detecting double MPEG compression”,in MM&Sec.
  23. W. Diffie and M. E. Hellman, New Directions in cryptography(1976), IEEE Trans. on Information Theory, Vol. 22, No. 6, pp.644-654.
  24. Vahideh Amanipour, Shahrokh Ghaemmaghami (2018),”Video-Tampering Detection and Content Reconstruction via Self-Embedding”, IEEE Transactions on Instrumentation and Measurement ( Volume: 67 , Issue: 3 , March 2018 ) Page(s): 505 - 515
  25. Weihong Wang and Hany Farid, “Exposing digital forgeries in video by detecting duplication,” in MM&Sec,2007

Downloads

Published

2019-10-30

Issue

Section

Research Articles

How to Cite

[1]
Ruksana Habeeb, Dr. L. C. Manikandan, " A Review : Video Tampering Attacks and Detection Techniques, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 5, pp.158-168, September-October-2019. Available at doi : https://doi.org/10.32628/CSEIT195524