Video content authentication techniques: a comprehensive survey

RD Singh, N Aggarwal - Multimedia Systems, 2018 - Springer
In this digital day and age, we are becoming increasingly dependent on multimedia content,
especially digital images and videos, to provide a reliable proof of occurrence of events …

Learning generalized deep feature representation for face anti-spoofing

H Li, P He, S Wang, A Rocha, X Jiang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we propose a novel framework leveraging the advantages of the
representational ability of deep learning and domain generalization for face spoofing …

Local tampering detection in video sequences

P Bestagini, S Milani, M Tagliasacchi… - 2013 IEEE 15th …, 2013 - ieeexplore.ieee.org
Video sequences are often believed to provide stronger forensic evidence than still images,
eg, when used in lawsuits. However, a wide set of powerful and easy-to-use video authoring …

Using visual rhythms for detecting video-based facial spoof attacks

A Pinto, WR Schwartz, H Pedrini… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Spoofing attacks or impersonation can be easily accomplished in a facial biometric system
wherein users without access privileges attempt to authenticate themselves as valid users …

An image recapture detection algorithm based on learning dictionaries of edge profiles

T Thongkamwitoon, H Muammar… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With today's digital camera technology, high-quality images can be recaptured from an liquid
crystal display (LCD) monitor screen with relative ease. An attacker may choose to recapture …

Unsupervised feature learning for bootleg detection using deep learning architectures

M Buccoli, P Bestagini, M Zanoni… - … and Security (WIFS), 2014 - ieeexplore.ieee.org
The widespread diffusion of portable devices capable of capturing high-quality multimedia
data, together with the rapid proliferation of media sharing platforms, has determined an …

Flicker forensics for camcorder piracy

A Hajj-Ahmad, S Baudry, B Chupeau… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Camcorder piracy refers to the process of using a camcorder to record a screen that displays
copyrighted content. In contrast to the previous works that aimed at detecting the occurrence …

Identification of aliasing-based patterns in re-captured LCD screens

B Mahdian, A Novozámský… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
In this paper we address the problem of identification of pictures and videos re-captured
from LCD screens. We show that they often exhibit detectable periodic patterns that are …

Video logo removal detection based on sparse representation

X Jin, Y Su, L Zou, C Zhang, P Jing, X Song - Multimedia Tools and …, 2018 - Springer
With the popularity of multimedia editing tools, more and more forged multimedia content
appeared on the network. Thus, the legal authorities need novel techniques to distinguish …

Temporal copy-move forgery detection and localization using block correlation matrix

E Aparicio-Díaz, R Cumplido… - Journal of Intelligent …, 2019 - content.iospress.com
One of the drawbacks of the current revolution on media is that tampering with images and
videos is an increasingly easy task which brings a situation where digital media cannot be …