Abstract

Video tampering and integrity detection can be defined as methods of alteration of the contents of the video which will enable it to hide objects, an occasion or adjust the importance passed on by the collection of images in the video. Modification of video contents is growing rapidly due to the expansion of the video procurement gadgets and great video altering programming devices. Subsequently verification of video files is transforming into something very vital. Video integrity verification aims to search out the hints of altering and subsequently asses the realness and uprightness of the video. These strategies might be ordered into active and passive techniques. Therefore our area of concern in this paper is to present our views on different passive video tampering detection strategies and integrity check. Passive video tampering identification strategies are grouped into consequent three classifications depending on the type of counterfeiting as: Detection of double or multiple compressed videos, Region altering recognition and Video inter-frame forgery detection. So as to detect the tampering of the video, it is split into frames and hash is generated for a group of frames referred to as Group of Pictures. This hash value is verified by the receiver to detect tampering.

Highlights

  • Data tampering is that demonstration of intentionally adjusting information through unapproved channels

  • As videos are used as evidences in many judiciary cases it is essential to ensure that there is no alteration of such videos. This is where video tampering detection comes into play

  • After each altering step, any video content is almost perpetually encoded with the end goal to store it utilizing a less amount of memory

Read more

Summary

Introduction

Data tampering is that demonstration of intentionally adjusting (wrecking, controlling or altering) information through unapproved channels. B) Region tampering detection: Region tampering detection methods provide data regarding the location of tampering in the spatial as well as temporal domain This type of tampering can occur either within the same frames or between different frames. This is done by copying a small portion of the frame and pasting at different location within the same frame, or copying explicit regions from a frame and pasting it at another sequence of the identical video. There are various steps used in passive video tampering detection which includes frame separation, hashing of these frames, identifying similar frames and grouping them. This hash generated is used to verify if the video is tampered or not

Problem Statement
Proposed Methodology
Compute the difference
Build the hash
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.