Abstract
Video plays a key role in carrying authenticity, especially in the surveillance system, medical field, court evidence, journalism, and social media among others. However, nowadays the trust in videos is decreasing day by day due to the forgery of the videos made by easily accessible video editing tools. Hence, a thrust for finding a robust solution to the problem of video forgery detection arises. As a result, researchers around the world are indulging themselves to come up with various methods for the said problem. In this article, we have comprehensively discussed many such initiatives made by researchers across the globe, keeping the focus on recent trends. In addition to this, we have also covered a wide range of forgery detection techniques that follow either an active or a passive approach, while the state-of-the-art surveys made so far on this research topic include only a few specific cases. In this article, we have described some recent technologies that are used in video forging, made a summary of the performances (provided categorically) of all the techniques discussed here, and briefed the available datasets. Finally, we have concluded this survey by clearly mentioning some future directions of the video forgery detection research based on a thorough review of existing techniques.
Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Afchar D, Nozick V, Yamagishi J, Echizen I (2018) Mesonet: a compact facial video forgery detection network. In: 2018 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1–7
Aghamaleki JA, Behrad A (2016) Inter-frame video forgery detection and localization using intrinsic effects of double compression on quantization errors of video coding. Signal Process Image Commun 47:289–302. https://doi.org/10.1016/j.image.2016.07.001
Aghamaleki JA, Behrad A (2017) Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects. Multimed Tools Appl 76:20691–20717
Al-Sanjary OI, Ahmed AA, Bin JAA, et al (2018) Detection clone an object movement using an optical flow approach. In: 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, pp 388–394
Al-Sanjary OI, Ahmed AA, Ahmad HB, et al (2018) Deleting object in video copy-move forgery detection based on optical flow concept. In: 2018 IEEE conference on systems, Process and Control (ICSPC). IEEE, pp 33–38
Ankerst M, Breunig MM, Kriegel H-P, Sander J (1999) OPTICS: ordering points to identify the clustering structure. ACM SIGMOD Rec 28(2):49–60. https://doi.org/10.1145/304181.304187
Antony N, Devassy BR (2018) Implementation of image/video copy-move forgery detection using brute-force matching. In: 2018 2nd international conference on trends in electronics and informatics (ICOEI). IEEE, pp 1085–1090
Aparicio-Díaz E, Cumplido R, Pérez Gort ML, Feregrino-Uribe C (2019) Temporal copy-move forgery detection and localization using block correlation matrix. J Intell Fuzzy Syst 36:5023–5035. https://doi.org/10.3233/JIFS-179048
Ardizzone E, Mazzola G (2015) A tool to support the creation of datasets of tampered videos. In: International Conference on Image Analysis and Processing. Springer, pp 665–675. https://doi.org/10.1007/978-3-319-23234-8_61
Bagiwa MA, Wahab AWA, Idris MYI, Khan S, Choo KKR (2016) Chroma key background detection for digital video using statistical correlation of blurring artifact. Digit Investig 19:29–43. https://doi.org/10.1016/j.diin.2016.09.001
Bakas J, Naskar R (2018) A digital forensic technique for inter–frame video forgery detection based on 3D CNN. In: International Conference on Information Systems Security. Springer, pp 304–317
Bakas J, Naskar R, Dixit R (2019) Detection and localization of inter-frame video forgeries based on inconsistency in correlation distribution between Haralick coded frames. Multimed Tools Appl 78:4905–4935. https://doi.org/10.1007/s11042-018-6570-8
Banerjee D, Chatterjee B, Bhowal P, Bhattacharyya T, Malakar S, Sarkar R (2021) A new wrapper feature selection method for language-invariant offline signature verification. Expert Syst Appl 186:115756. https://doi.org/10.1016/j.eswa.2021.115756
Barburiceanu S, Terebes R, Meza S (2021) 3D texture feature extraction and classification using GLCM and LBP-based descriptors. Appl Sci 11(5):2332. https://doi.org/10.3390/app11052332
Barnes C, Shechtman E, Finkelstein A, Goldman DB (2009) PatchMatch: a randomized correspondence algorithm for structural image editing. ACM Trans Graph 28(3):24
Barua S, Malakar S, Bhowmik S, Sarkar R, Nasipuri M (2017) Bangla handwritten city name recognition using gradient-based feature. In: 5th international conference on Frontiers in intelligent computing: theory and applications. Springer, Singapore, pp 343–352
Benford F (1938) The law of anomalous numbers. Proc Am Philos Soc 78(4):551–572. http://www.jstor.org/stable/984802
Bestagini P, Milani S, Tagliasacchi M, Tubaro S (2013) Local tampering detection in video sequences. In: 2013 IEEE 15th international workshop on multimedia signal processing (MMSP). IEEE, pp 488–493. https://doi.org/10.1109/MMSP.2013.6659337
Bidokhti A, Ghaemmaghami S (2015) Detection of regional copy/move forgery in MPEG videos using optical flow. In: 2015 the international symposium on artificial intelligence and signal processing (AISP). IEEE, pp 13–17. https://doi.org/10.1109/AISP.2015.7123529
Bonettini N, Cannas ED, Mandelli S, Bondi L, Bestagini P, Tubaro S (2021). Video face manipulation detection through ensemble of cnns. In: 25th international conference on pattern recognition (ICPR). IEEE, pp 5012–5019
Nimble Challenge (2017) https://www.nist.gov/itl/iad/mig/nimble-challenge-2017-evaluation. Accessed 30 Sep 2022
Change detection video database (2022) http://changedetection.net/. Accessed 30 Sep 2022
Chao J, Jiang X, Sun T (2012) A novel video inter-frame forgery model detection scheme based on optical flow consistency. In: International Workshop on Digital Watermarking. Springer, pp 267–281
Chatterjee A, Malakar S, Sarkar R, Nasipuri M (2018) Handwritten digit recognition using DAISY descriptor: a study. In: proceedings of 5th international conference on emerging applications of information technology (EAIT 2018). IEEE, pp 1–4
Chen W, Shi YQ (2008) Detection of double MPEG compression based on first digit statistics. In: International Workshop on Digital Watermarking. Springer, pp 16–30
Chen M, Fridrich J, Goljan M, Lukáš J (2007) Source digital camcorder identification using sensor photo response non-uniformity. In: security, steganography, and watermarking of multimedia contents IX. SPIE, pp 517–528
Chen H, Chen Z, Zeng X, Fan W, Xiong Z (2008) A novel reversible semi-fragile watermarking algorithm of MPEG-4 video for content authentication. In: Second International Symposium on Intelligent Information Technology Application. IEEE, pp 37–41. https://doi.org/10.1109/IITA.2008.451
Chen C, Shi YQ, Su W (2008) A machine learning based scheme for double JPEG compression detection. In: Proceedings of International Conference on Pattern Recognition (IAPR). IEEE, pp 1–4
Chen S, Tan S, Li B, Huang J (2015) Automatic detection of object-based forgery in advanced video. IEEE Trans Circuits Syst Vid Technol 26:2138–2151
Chittapur G, Murali S, Anami BS (2019) Video forgery detection using motion extractor by referring block matching algorithm. Int J Sci Technol Res 8:3240–3243
Corripio JR, González DMA, Orozco ALS, Villalba LJG, Hernandez-Castro J, Gibson SJ (2013) Source smartphone identification using sensor pattern noise and wavelet transform. In: 5th International Conference on Imaging for Crime Detection and Prevention (ICDP 2013). pp 1–6. https://doi.org/10.1049/ic.2013.0267
Costanzo A, Barni M (2016) Detection of double AVC/HEVC encoding. In: 24th European Signal Processing Conference (EUSIPCO). IEEE, pp 2245–2249. https://doi.org/10.1109/EUSIPCO.2016.7760648
D’Amiano L, Cozzolino D, Poggi G, Verdoliva L (2015) Video forgery detection and localization based on 3D patchmatch. In: 2015 IEEE international conference on Multimedia & Expo Workshops (ICMEW). IEEE, pp 1–6
D’Amiano L, Cozzolino D, Poggi G, Verdoliva L (2018) A patchmatch-based dense-field algorithm for video copy–move detection and localization. IEEE Trans Circuits Syst Vid Technol 29:669–682
D’Avino D, Cozzolino D, Poggi G, Verdoliva L (2017) Autoencoder with recurrent neural networks for video forgery detection. IS T Int Symp Electron Imaging Sci Technol 92–99. https://doi.org/10.2352/ISSN.2470-1173.2017.7.MWSF-330
Das S, Chatterjee A, Dey S, Saha S, Malakar S (2023) Breast cancer detection from histology images using deep feature selection. In: Proceedings of International Conference on Frontiers in Computing and Systems. Springer, pp 323–330
DERF’s collection (2022) https://media.xiph.org/video/derf/. Accessed 30 Sep 2022
Dey S, Roychoudhury R, Malakar S, Sarkar R (2022) An optimized fuzzy ensemble of convolutional neural networks for detecting tuberculosis from chest X-ray images. Appl Soft Comput 114:108094
Dey C, Bose R, Ghosh KK, Malakar S, Sarkar R (2022) LAGOA: learning automata based grasshopper optimization algorithm for feature selection in disease datasets. J Ambient Intell Humaniz Comput 13:3175–3194
Dirik AE, Sencar HT, Memon N (2008) Digital single lens reflex camera identification from traces of sensor dust. IEEE Trans Inf Forensic Secur 3:539–552
Dolhansky B, Bitton J, Pflaum B, Lu J, Howes R, Wang M, Ferrer, CC (2020) The deepfake detection challenge (dfdc) dataset. arXiv Prepr arXiv200607397
Donahue J, Hendricks LA, Guadarrama S, Rohrbach M, Venugopalan S, Saenko K, Darrell T (2015) Long-term recurrent convolutional networks for visual recognition and description. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. pp 2625–2634
Elrowayati AA, Abdullah MFL, Manaf AA, Alfagi AS (2017) Tampering detection of double-compression with the same quantization parameter in HEVC video streams. In: 2017 7th IEEE international conference on control system, Computing and Engineering (ICCSCE). IEEE, pp 174–179
Fadl S, Han Q, Qiong L (2020) Exposing video inter-frame forgery via histogram of oriented gradients and motion energy image. Multidim Syst Signal Process 31:1365–1384
Fadl S, Megahed A, Han Q, Qiong L (2020) Frame duplication and shuffling forgery detection technique in surveillance videos based on temporal average and gray level co-occurrence matrix. Multimed Tools Appl 79:17619–17643
Fadl S, Han Q, Li Q (2021) CNN spatiotemporal features and fusion for surveillance video forgery detection. Signal Process Image Commun 90:116066. https://doi.org/10.1016/j.image.2020.116066
Fayyaz MA, Anjum A, Ziauddin S, Khan A, Sarfaraz A (2020) An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues. Multimed Tools Appl 79:5767–5788
Feng C, Xu Z, Jia S, Zhang W, Xu Y (2016) Motion-adaptive frame deletion detection for digital video forensics. IEEE Trans Circuits Syst Vid Technol 27:2543–2554
Ganguly S, Mohiuddin S, Malakar S, Cuevas E, Sarkar R (2022) Visual attention-based deepfake video forgery detection. Pattern Anal Appl 25(4):981–992
Ganguly S, Ganguly A, Mohiuddin S, Malakar S, Sarkar R (2022) ViXNet: vision transformer with Xception network for deepfakes based video and image forgery detection. Expert Syst Appl 210:118423
GRIP (2022) http://www.grip.unina.it/. Accessed 30 Sep 2022
Güera D, Delp EJ (2018) Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE international conference on advanced video and signal based surveillance (AVSS). IEEE, pp 1–6
Gupta A, Gupta S, Mehra A (2015) Video authentication in digital forensic. In: 2015 international conference on futuristic trends on computational analysis and knowledge management (ABLAZE). IEEE, pp 659–663
He P, Jiang X, Sun T, Wang S, Li B, Dong Y (2017) Frame-wise detection of relocated I-frames in double compressed H. 264 videos based on convolutional neural network. J Vis Commun Image Represent 48:149–158
Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9:1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735
Hodge V, Austin J (2004) A survey of outlier detection methodologies. Artif Intell Rev 22:85–126
Hong JH, Yang Y, Oh BT (2019) Detection of frame deletion in HEVC-coded video in the compressed domain. Digit Investig 30:23–31
Hsu C-C, Hung T-Y, Lin C-W, Hsu C-T (2008) Video forgery detection using correlation of noise residue. In: 2008 IEEE 10th workshop on multimedia signal processing. IEEE, pp 170–174
Huang M, Wang R, Xu J, et al (2015) Detection of double compression for HEVC videos based on the co-occurrence matrix of DCT coefficients. In: International Workshop on Digital Watermarking. Springer, pp 61–71
Huang CC, Zhang Y, Thing VLL (2017) Inter-frame video forgery detection based on multi-level subtraction approach for realistic video forensic applications. In: 2017 IEEE 2nd international conference on signal and image processing (ICSIP). IEEE, pp 20–24
Huang CC, Lee CE, Thing VLLL (2020) A novel video forgery detection model based on triangular polarity feature classification. Int J Digit Crime Forensic 12:14–34. https://doi.org/10.4018/IJDCF.2020010102
Hyun D-K, Ryu S-J, Lee H-Y, Lee H-K (2013) Detection of upscale-crop and partial manipulation in surveillance video based on sensor pattern noise. Sensors 13:12605–12631
Hyun D-K, Lee M-J, Ryu S-J, et al (2013) Forgery detection for surveillance video. In: The Era of Interactive Media. Springer, pp 25–36
Iglewicz B, Hoaglin D (1993) Volume 16: how to detect and handle outliers. In: the ASQC basic references in quality control: statistical techniques. Quality Press, Welshpool
Ismael Al-Sanjary O, Ahmed AA, Sulong G (2016) Development of a video tampering dataset for forensic investigation. Forensic Sci Int 266:565–572. https://doi.org/10.1016/j.forsciint.2016.07.013
IVY LAB (2022) http://ivylabdb.kaist.ac.kr/base/dataset/data.php. Accessed 30 Sep 2022
Jia S, Xu Z, Wang H et al (2018) Coarse-to-fine copy-move forgery detection for video forensics. IEEE Access 6:25323–25335
Jiang X, Wang W, Sun T, Shi YQ, Wang S (2013) Detection of double compression in MPEG-4 videos based on Markov statistics. IEEE Signal Process Lett 20:447–450
Jiang X, He P, Sun T, Wang R (2019) Detection of double compressed HEVC videos using GOP-based PU type statistics. IEEE Access 7:95352–95363
Johnston P, Elyan E (2019) A review of digital video tampering: from simple editing to full synthesis. Digit Investig 29:67–81
Joshi V, Jain S (2020) Tampering detection and localization in digital video using temporal difference between adjacent frames of actual and reconstructed video clip. Int J Inf Technol 12:273–282
Kancherla K, Mukkamala S (2012) Novel blind video forgery detection using markov models on motion residue. In: Asian Conference on Intelligent Information and Database Systems. Springer, pp 308–315
Kang X, Liu J, Liu H, Wang ZJ (2016) Forensics and counter anti-forensics of video inter-frame forgery. Multimed Tools Appl 75:13833–13853
Kaur H, Jindal N (2020) Image and video forensics: a critical survey. Wirel Pers Commun 112:1–22
Kaur H, Jindal N (2020) Deep convolutional neural network for graphics forgery detection in video. Wirel Pers Commun 112:1763–1781. https://doi.org/10.1007/s11277-020-07126-3
Kaur R, Kaur EJ (2016) Video forgery detection using hybrid techniques. International Journal of Advanced Research in Computer and Communication Engineering 5(12):112–117. https://doi.org/10.17148/IJARCCE.2016.51221
Kay SM (1993) Fundamentals of statistical signal processing: estimation theory. Prentice Hall PTR
Kerekes RA, Vijaya Kumar BVK (2006) Correlation filters with controlled scale response. IEEE Trans Image Process 15(7):1794–1802. https://doi.org/10.1109/TIP.2006.873468
Kharat J, Chougule S (2020) A passive blind forgery detection technique to identify frame duplication attack. Multimed Tools Appl 79(11–12):8107–8123
Kingra S, Aggarwal N, Singh RD (2016) Video inter-frame forgery detection: a survey. Indian J Sci Technol 9(44):1–9
Kingra S, Aggarwal N, Singh RD (2017) Video Inter-frame Forgery Detection Approach for Surveillance and Mobile Recorded Videos Int J Electr Comput Eng 7(2):831
Kirchner M, Johnson C (2020) Spn-cnn: boosting sensor-based source camera attribution with deep learning. In: IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp 1–6
Kohli A, Gupta A, Singhal D (2020) CNN based localisation of forged region in object-based forgery for HD videos. IET Image Process 14(5):947–958
Kono K, Yoshida T, Ohshiro S, Babaguchi N (2018) Passive video forgery detection considering Spatio-temporal consistency. In: International Conference on Soft Computing and Pattern Recognition. Springer, pp 381–391
Korshunov P, Marcel S (2018) Deepfakes: a new threat to face recognition? Assessment and detection. arXiv Prepr arXiv181208685
Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural networks. Communications of the ACM 60(6):84–90
Kumar V, Gaur M (2022) Deep feature based forgery detection in video using parallel convolutional neural network: VFID-net. Multimed Tools Appl 81(29):42223–42240
Kumar V, Gaur M (2022) Multiple forgery detection in video using inter-frame correlation distance with dual-threshold. Multimed Tools Appl 81:43979–43998
LASIESTA dataset (2022) https://computervisiononline.com/dataset/1105138810. Accessed 30 Sep 2022
Li C-T (2010) Source camera identification using enhanced sensor pattern noise. IEEE Trans Inf Forensic Secur 5:280–287
Li ZH, Jia R, Zhang ZZ, Liang, XY, Wang JW (2017) Double HEVC compression detection with different bitrates based on co-occurrence matrix of PU types and DCT coefficients. In: ITM web of conferences. EDP Sciences, p 01020
Li Q, Wang R, Xu D (2018) Detection of double compression in HEVC videos based on TU size and quantised DCT coefficients. IET Inf Secur 13(1):1–6
Li Y, Chang MC, Lyu S (2019) Exposing AI created fake videos by detecting eye blinking. In: Proceedings of the 2018 IEEE Int Work on Inf Forensics Secur (WIFS). IEEE, pp 1–7. https://doi.org/10.1109/WIFS.2018.8630787
Li Y, Yang X, Sun P, et al (2020) Celeb-DF: a large-scale challenging dataset for DeepFake forensics. In: Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit (CVPR). IEEE, pp 3204–3213. https://doi.org/10.1109/CVPR42600.2020.00327
Liang X, Li Z, Yang Y, Zhang Z, Zhang Y (2018) Detection of double compression for HEVC videos with fake bitrate. IEEE Access 6:53243–53253
Lin CS, Tsay JJ (2014) A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digit Investig 11:120–140. https://doi.org/10.1016/j.diin.2014.03.016
Lin X, Li JH, Wang SL, Liew AWC, Cheng F, Huang XS (2018) Recent advances in passive digital image security forensics: a brief review. Engineering 4(1):29–39
Liu H, Li S, Bian S (2014) Detecting frame deletion in H. 264 video. In: international conference on information security practice and experience. Springer, pp 262–270
Liu Y, Huang T, Liu Y (2018) A novel video forgery detection algorithm for blue screen compositing based on 3-stage foreground analysis and tracking. Multimed Tools Appl 77:7405–7427
Long C, Smith E, Basharat A, Hoogs A (2017) A c3d-based convolutional neural network for frame dropping detection in a single video shot. In: 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW). IEEE, pp 1898–1906
López RR, Luengo EA, Orozco ALS, Villalba LJG (2020) Digital video source identification based on Container’s structure analysis. IEEE Access 8:36363–36375
Lucas BD, Kanade T (1981) Iterative image registration technique with an application to Streo vision. In: 7th international joint conference on articficial intelligence (IJCAI). HAL, pp 674–679
Ma R, Chen J, Su Z (2010) MI-SIFT: Mirror and inversion invariant generalization for SIFT descriptor. In: 2010 ACM International Conference on Image and Video Retrieval (CIVR 2010). ACM Digit Lib, pp 228–235
Mandelli S, Bestagini P, Tubaro S, et al (2018) Blind detection and localization of video temporal splicing exploiting sensor-based footprints. In: 2018 26th European signal processing conference (EUSIPCO). IEEE, pp 1362–1366
Matern F, Riess C, Stamminger M (2019) Exploiting visual artifacts to expose deepfakes and face manipulations. In: 2019 IEEE winter applications of computer vision workshops (WACVW). IEEE, pp 83–92
Mizher MA, Ang MC, Mazhar AA, Mizher MA (2017) A review of video falsifying techniques and video forgery detection techniques. Int J Electron Secur Digit Forensic 9:191–208
Mohiuddin S, Malakar S, Sarkar R (2021) Duplicate frame detection in forged videos using sequence matching. In: Proceedings of 3rd international conference on computational intelligence in communications and business analytics (CICBA-2021). Springer, pp 29–41
Mohiuddin S, Ganguly S, Malakar S, Kaplun D, Sarkar R (2022) A feature fusion based deep learning model for Deepfake video detection. In: International Conference on Mathematics and its Applications in new Computer Systems (MANCS-2021). Springer, pp 197–206
Nguyen HH, Yamagishi J, Echizen I (2019) Capsule-forensics: using capsule networks to detect forged images and videos. In: 2019 IEEE international conference on acoustics, Speech and Signal Processing (ICASSP-2019). IEEE, pp 2307–2311
NTHU Forensics project (2022) http://www.ee.nthu.edu.tw/cwlin/forensics/forensics.html. Accessed 30 Sep 2022
Panchal HD, Shah HB (2020) Video tampering dataset development in temporal domain for video forgery authentication. Multimed Tools Appl 79:24553–24577. https://doi.org/10.1007/s11042-020-09205-w
Pandey RC, Singh SK, Shukla KK (2014) Passive copy-move forgery detection in videos. In: 2014 international conference on computer and communication technology (ICCCT). IEEE, pp 301–306
Park JY, Lim JH, Kim GS, Won CS (2002) Invertible semi-fragile watermarking algorithm distinguishing MPEG-2 compression from malicious manipulation. In: 2002 digest of technical papers. International conference on consumer electronics (IEEE cat. No. 02CH37300). IEEE, pp 18–19
Paul A, Pramanik R, Malakar S, Sarkar R (2022) An ensemble of deep transfer learning models for handwritten music symbol recognition. Neural Comput & Applic 34:10409–10427
Pramanik R, Dey S, Malakar S, Mirjalili S, Sarkar R (2022) TOPSIS aided ensemble of CNN models for screening COVID-19 in chest X-ray images. Sci Rep 12(1):15409
Qadir G, Yahaya S, Ho AT (2012) Surrey university library for forensic analysis (SULFA) of video content. In: IET Conference on Image Processing (IPR 2012). http://sulfa.cs.surrey.ac.uk/index.php. Accessed 30 Sep 2022
Recognition of human actions (2022) https://www.csc.kth.se/cvap/actions/. Accessed 30 Sep 2022
REWIND Database (2022) https://sites.google.com/site/rewindpolimi/downloads/datasets. Accessed 30 Sep 2022
Rocha A, Scheirer W, Boult T, Goldenstein S (2011) Vision of the unseen: current trends and challenges in digital image and video forensics. ACM Comput Surv 43(4):1–42
Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nießner M (2019) Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE/CVF International Conference on Computer Vision. IEEE, pp 1–11
Roy S, Bhattacharya A, Sarkar N, Malakar S, Sarkar R (2020) Offline hand-drawn circuit component recognition using texture and shape-based features. Multimed Tools Appl 79:31353–31373
Roy S, Sarkar D, Malakar S, Sarkar R (2021) Offline signature verification system: a graph neural network based approach. J ambient Intell Humaniz Comput 1–11. https://doi.org/10.1007/s12652-021-03592-0
Saddique M, Asghar K, Bajwa UI, Hussain M, Habib Z (2019) Spatial video forgery detection and localization using texture analysis of consecutive frames. Advances in Electrical and Computer Engg 19(3):97–108
Saddique M, Asghar K, Bajwa UI, Hussain M, Aboalsamh HA, Habib Z (2020) Classification of authentic and tampered video using motion residual and parasitic layers. IEEE Access 8:56782–56797. https://doi.org/10.1109/ACCESS.2020.2980951
Sah AK, Bhowmik S, Malakar S, Sarkar R, Kavallieratou E, Vasilopoulos N (2018) Text and non-Text recognition using modified HOG descriptor. In: Proceedings of IEEE Calcutta Conference (CALCON 2017). IEEE, pp 64–68. https://doi.org/10.1109/CALCON.2017.8280697
Sarkar S, Ghosh M, Chatterjee A, Malakar S, Sarkar R (2019) An advanced particle swarm optimization based feature selection method for tri-script handwritten digit recognition. In: Proceedings of Second International Conference on Computational Intelligence, Communications, and Business Analytics. Springer Singapore, pp 27–28
Sawant R, Sabnis M (2018) A review of video forgery and its detection. J Comput Eng 20(2):1–4
Shanableh T (2013) Detection of frame deletion for digital video forensics. Digit Investig 10:350–360
Shaw SS, Ahmed S, Malakar S, Garcia-Hernandez L, Abraham A, Sarkar R (2021) Hybridization of ring theory-based evolutionary algorithm and particle swarm optimization to solve class imbalance problem. Complex Intell Syst 7:2069–2091
Shaw SS, Ahmed S, Malakar S, Sarkar R (2021) An ensemble approach for handling class imbalanced disease datasets. In: Proceedings of International Conference on Machine Intelligence and Data Science Applications. Springer, pp 345–355
Shelke NA, Kasana SS (2021) A comprehensive survey on passive techniques for digital video forgery detection. Multimed Tools Appl 80:6247–6310
Shelke NA, Kasana SS (2022) Multiple forgery detection and localization technique for digital video using PCT and NBAP. Multimed Tools Appl 81:22731–22759
Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: 3rd international conference on learning representations (ICLR 2015). https://doi.org/10.48550/arXiv.1409.1556
Singh RD, Aggarwal N (2015) Detection of re-compression, transcoding and frame-deletion for digital video authentication. In: 2nd international conference on recent advances in Engineering Computational Sciences (RAECS 2015). IEEE, pp 1–6
Singh RD, Aggarwal N (2017) Detection of upscale-crop and splicing for digital video authentication. Digital Investigation 21:31–52
Singh RD, Aggarwal N (2018) Video content authentication techniques: a comprehensive survey. Multimedia Systems 24:211–240. https://doi.org/10.1007/s00530-017-0538-9
Singh G, Singh K (2019) Video frame and region duplication forgery detection based on correlation coefficient and coefficient of variation. Multimed Tools Appl 78:11527–11562. https://doi.org/10.1007/s11042-018-6585-1
Singh G, Singh K (2022) Chroma key foreground forgery detection under various attacks in digital video based on frame edge identification. Multimed Tools Appl 81:1419–1446
Su L, Li C (2018) A novel passive forgery detection algorithm for video region duplication. Multidim Syst Sign Process 29:1173–1190. https://doi.org/10.1007/s11045-017-0496-6
Su L, Li C, Lai Y, Yang J (2017) A fast forgery detection algorithm based on exponential-Fourier moments for video region duplication. IEEE Trans Multimed 20:825–840
Su L, Luo H, Wang S (2019) A novel forgery detection algorithm for video foreground removal. IEEE Access 7:109719–109728. https://doi.org/10.1109/access.2019.2933871
Subramanyam AV, Emmanuel S (2013) Pixel estimation based video forgery detection. In: 2013 IEEE international conference on acoustics, Speech and Signal Processing. IEEE, pp 3038–3042
Sun T, Wang W, Jiang X (2012) Exposing video forgeries by detecting MPEG double compression. In: IEEE international conference on acoustics, Speech and Signal Processing (ICASSP 2012). IEEE, pp 1389–1392
Suwajanakorn S, Seitz SM, Kemelmacher-Shlizerman I (2017) Synthesizing obama: learning lip sync from audio. ACM Transactions on Graphics (ToG) 36(4):1–13
TREC Video Retrieval Evaluation (2022) http://trecvid.nist.gov/. Accessed 30 Sep 2022
Verdoliva L (2020) Media forensics and deepfakes: an overview. IEEE J Sel Top Signal Process 14:910–932
Video Inpainting Under Camera Motion (2022) http://www.tc.umn.edu/~patw0007/video-inpainting/. Accessed 30 Sep 2022
Video Motion Interpolation for Special Effect (2022) http://member.mine.tku.edu.tw/www/TSMC09/. Accessed 30 Sep 2022
Video Trace Library (2022) http://trace.eas.asu.edu/. Accessed 30 Sep 2022
Wang W, Farid H (2006) Exposing digital forgeries in video by detecting double MPEG compression. In: Proceedings of the 8th workshop on multimedia and security. ACM Digital Library, pp 37–47
Wang W, Farid H (2009) Exposing digital forgeries in video by detecting double quantization. In: proceedings of the 11th ACM workshop on multimedia and security, pp 39–48
Wang W, Jiang X, Wang S, Wan M, Sun T (2013) Identifying video forgery process using optical flow. In: International Workshop on Digital Watermarking. Springer, pp 244–257
Wu Y, Jiang X, Sun T, Wang W (2014) Exposing video inter-frame forgery based on velocity field consistency. In: IEEE international conference on acoustics, speech and signal processing (ICASSP 2014). IEEE, pp 2674–2678
Xiaozhong P, Haoming W (2012) The detection method of image regional forgery based DWT and 2DIMPCA. In: Advanced Materials Research. Trans Tech Publications Ltd, pp 692–696
Xu J, Yu Y, Su Y, Dong B, You X (2012) Detection of blue screen special effects in videos. Phys Procedia 33:1316–1322
Xu J, Su Y, Liu Q (2013) Detection of double MPEG-2 compression based on distributions of DCT coefficients. Int J Pattern Recognit Artif Intell 27:1354001
Xu Q, Sun T, Jiang X, Dong Y (2017) HEVC double compression detection based on SN-PUPM feature. In: International Workshop on Digital Watermarking. Springer, pp 3–17
Yao Y, Shi Y, Weng S, Guan B (2018) Deep learning for detection of object-based forgery in advanced video. Symmetry (Basel) 10(1):1–10
Yin P, Yu HH (2001) Classification of video tampering methods and countermeasures using digital watermarking. In: Proceedings of International Symposium on the Convergence of IT and Communications. SPIE, pp 239–246
YouTube [HD] (2022) https://www.youtube.com/watch?v=66Ob1aJedHc&t=14s. Accessed 30 Sep 2022
Yu L, Yang Y, Li Z et al (2019) HEVC double compression detection under different bitrates based on TU partition type. EURASIP J Image Vid Process 2019(1):1–12
Yu Y, Yao H, Ni R, Zhao Y (2020) Detection of fake high definition for HEVC videos based on prediction mode feature. Signal Process 166:107269
Yuan Z, Chen H, Li T, Liu J, Wang S (2021) Fuzzy information entropy-based adaptive approach for hybrid feature outlier detection. Fuzzy Sets Syst 421:1–28
YUV Dataset (2022) http://www.trace.eas.asu.edu/yuv/index.html. Accessed 30 Sep 2022
Zhang K, Zhang L, Yang M-H (2014) Fast compressive tracking. IEEE Trans Pattern Anal Mach Intell 36(10):2002–2015
Zhang Z, Hou J, Ma Q, Li Z (2015) Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames. Secur Commun Netw 8:311–320
Zhao D-N, Wang R-K, Lu Z-M (2018) Inter-frame passive-blind forgery detection for video shot based on similarity analysis. Multimed Tools Appl 77:25389–25408
Zheng L, Sun T, Shi Y-Q (2014) Inter-frame video forgery detection based on block-wise brightness variance descriptor. In: International Workshop on Digital Watermarking. Springer, pp 18–30
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Research involving human participants and/or animals
No human and animal participants were used.
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this article.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Mohiuddin, S., Malakar, S., Kumar, M. et al. A comprehensive survey on state-of-the-art video forgery detection techniques. Multimed Tools Appl 82, 33499–33539 (2023). https://doi.org/10.1007/s11042-023-14870-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-14870-8