
An Overview of Digital Video Tampering Detection Using Passive Methods and D-Hash Algorithm
Author(s) -
Anto Crescentia.A,
G. Sujatha
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i4.6.28444
Subject(s) - computer science , hash function , computer vision , video compression picture types , digital video , artificial intelligence , identification (biology) , video tracking , video processing , frame (networking) , uncompressed video , computer security , telecommunications , botany , biology
Video tampering and integrity detection can be defined as methods of alteration of the contents of the video which will enable it to hide objects, an occasion or adjust the importance passed on by the collection of images in the video. Modification of video contents is growing rapidly due to the expansion of the video procurement gadgets and great video altering programming devices. Subsequently verification of video files is transforming into something very vital. Video integrity verification aims to search out the hints of altering and subsequently asses the realness and uprightness of the video. These strategies might be ordered into active and passive techniques. Therefore our area of concern in this paper is to present our views on different passive video tampering detection strategies and integrity check. Passive video tampering identification strategies are grouped into consequent three classifications depending on the type of counterfeiting as: Detection of double or multiple compressed videos, Region altering recognition and Video inter-frame forgery detection. So as to detect the tampering of the video, it is split into frames and hash is generated for a group of frames referred to as Group of Pictures. This hash value is verified by the receiver to detect tampering.