Skip to main content
Log in

A comprehensive survey on state-of-the-art video forgery detection techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Video plays a key role in carrying authenticity, especially in the surveillance system, medical field, court evidence, journalism, and social media among others. However, nowadays the trust in videos is decreasing day by day due to the forgery of the videos made by easily accessible video editing tools. Hence, a thrust for finding a robust solution to the problem of video forgery detection arises. As a result, researchers around the world are indulging themselves to come up with various methods for the said problem. In this article, we have comprehensively discussed many such initiatives made by researchers across the globe, keeping the focus on recent trends. In addition to this, we have also covered a wide range of forgery detection techniques that follow either an active or a passive approach, while the state-of-the-art surveys made so far on this research topic include only a few specific cases. In this article, we have described some recent technologies that are used in video forging, made a summary of the performances (provided categorically) of all the techniques discussed here, and briefed the available datasets. Finally, we have concluded this survey by clearly mentioning some future directions of the video forgery detection research based on a thorough review of existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Afchar D, Nozick V, Yamagishi J, Echizen I (2018) Mesonet: a compact facial video forgery detection network. In: 2018 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1–7

  2. Aghamaleki JA, Behrad A (2016) Inter-frame video forgery detection and localization using intrinsic effects of double compression on quantization errors of video coding. Signal Process Image Commun 47:289–302. https://doi.org/10.1016/j.image.2016.07.001

  3. Aghamaleki JA, Behrad A (2017) Malicious inter-frame video tampering detection in MPEG videos using time and spatial domain analysis of quantization effects. Multimed Tools Appl 76:20691–20717

    Article  Google Scholar 

  4. Al-Sanjary OI, Ahmed AA, Bin JAA, et al (2018) Detection clone an object movement using an optical flow approach. In: 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, pp 388–394

  5. Al-Sanjary OI, Ahmed AA, Ahmad HB, et al (2018) Deleting object in video copy-move forgery detection based on optical flow concept. In: 2018 IEEE conference on systems, Process and Control (ICSPC). IEEE, pp 33–38

  6. Ankerst M, Breunig MM, Kriegel H-P, Sander J (1999) OPTICS: ordering points to identify the clustering structure. ACM SIGMOD Rec 28(2):49–60. https://doi.org/10.1145/304181.304187

  7. Antony N, Devassy BR (2018) Implementation of image/video copy-move forgery detection using brute-force matching. In: 2018 2nd international conference on trends in electronics and informatics (ICOEI). IEEE, pp 1085–1090

  8. Aparicio-Díaz E, Cumplido R, Pérez Gort ML, Feregrino-Uribe C (2019) Temporal copy-move forgery detection and localization using block correlation matrix. J Intell Fuzzy Syst 36:5023–5035. https://doi.org/10.3233/JIFS-179048

    Article  Google Scholar 

  9. Ardizzone E, Mazzola G (2015) A tool to support the creation of datasets of tampered videos. In: International Conference on Image Analysis and Processing. Springer, pp 665–675. https://doi.org/10.1007/978-3-319-23234-8_61

  10. Bagiwa MA, Wahab AWA, Idris MYI, Khan S, Choo KKR (2016) Chroma key background detection for digital video using statistical correlation of blurring artifact. Digit Investig 19:29–43. https://doi.org/10.1016/j.diin.2016.09.001

    Article  Google Scholar 

  11. Bakas J, Naskar R (2018) A digital forensic technique for inter–frame video forgery detection based on 3D CNN. In: International Conference on Information Systems Security. Springer, pp 304–317

  12. Bakas J, Naskar R, Dixit R (2019) Detection and localization of inter-frame video forgeries based on inconsistency in correlation distribution between Haralick coded frames. Multimed Tools Appl 78:4905–4935. https://doi.org/10.1007/s11042-018-6570-8

    Article  Google Scholar 

  13. Banerjee D, Chatterjee B, Bhowal P, Bhattacharyya T, Malakar S, Sarkar R (2021) A new wrapper feature selection method for language-invariant offline signature verification. Expert Syst Appl 186:115756. https://doi.org/10.1016/j.eswa.2021.115756

    Article  Google Scholar 

  14. Barburiceanu S, Terebes R, Meza S (2021) 3D texture feature extraction and classification using GLCM and LBP-based descriptors. Appl Sci 11(5):2332. https://doi.org/10.3390/app11052332

    Article  Google Scholar 

  15. Barnes C, Shechtman E, Finkelstein A, Goldman DB (2009) PatchMatch: a randomized correspondence algorithm for structural image editing. ACM Trans Graph 28(3):24

  16. Barua S, Malakar S, Bhowmik S, Sarkar R, Nasipuri M (2017) Bangla handwritten city name recognition using gradient-based feature. In: 5th international conference on Frontiers in intelligent computing: theory and applications. Springer, Singapore, pp 343–352

    Google Scholar 

  17. Benford F (1938) The law of anomalous numbers. Proc Am Philos Soc 78(4):551–572. http://www.jstor.org/stable/984802

  18. Bestagini P, Milani S, Tagliasacchi M, Tubaro S (2013) Local tampering detection in video sequences. In: 2013 IEEE 15th international workshop on multimedia signal processing (MMSP). IEEE, pp 488–493. https://doi.org/10.1109/MMSP.2013.6659337

  19. Bidokhti A, Ghaemmaghami S (2015) Detection of regional copy/move forgery in MPEG videos using optical flow. In: 2015 the international symposium on artificial intelligence and signal processing (AISP). IEEE, pp 13–17. https://doi.org/10.1109/AISP.2015.7123529

  20. Bonettini N, Cannas ED, Mandelli S, Bondi L, Bestagini P, Tubaro S (2021). Video face manipulation detection through ensemble of cnns. In: 25th international conference on pattern recognition (ICPR). IEEE, pp 5012–5019

  21. Nimble Challenge (2017) https://www.nist.gov/itl/iad/mig/nimble-challenge-2017-evaluation. Accessed 30 Sep 2022

  22. Change detection video database (2022) http://changedetection.net/. Accessed 30 Sep 2022

  23. Chao J, Jiang X, Sun T (2012) A novel video inter-frame forgery model detection scheme based on optical flow consistency. In: International Workshop on Digital Watermarking. Springer, pp 267–281

  24. Chatterjee A, Malakar S, Sarkar R, Nasipuri M (2018) Handwritten digit recognition using DAISY descriptor: a study. In: proceedings of 5th international conference on emerging applications of information technology (EAIT 2018). IEEE, pp 1–4

  25. Chen W, Shi YQ (2008) Detection of double MPEG compression based on first digit statistics. In: International Workshop on Digital Watermarking. Springer, pp 16–30

  26. Chen M, Fridrich J, Goljan M, Lukáš J (2007) Source digital camcorder identification using sensor photo response non-uniformity. In: security, steganography, and watermarking of multimedia contents IX. SPIE, pp 517–528

  27. Chen H, Chen Z, Zeng X, Fan W, Xiong Z (2008) A novel reversible semi-fragile watermarking algorithm of MPEG-4 video for content authentication. In: Second International Symposium on Intelligent Information Technology Application. IEEE, pp 37–41. https://doi.org/10.1109/IITA.2008.451

  28. Chen C, Shi YQ, Su W (2008) A machine learning based scheme for double JPEG compression detection. In: Proceedings of International Conference on Pattern Recognition (IAPR). IEEE, pp 1–4

  29. Chen S, Tan S, Li B, Huang J (2015) Automatic detection of object-based forgery in advanced video. IEEE Trans Circuits Syst Vid Technol 26:2138–2151

    Article  Google Scholar 

  30. Chittapur G, Murali S, Anami BS (2019) Video forgery detection using motion extractor by referring block matching algorithm. Int J Sci Technol Res 8:3240–3243

    Google Scholar 

  31. Corripio JR, González DMA, Orozco ALS, Villalba LJG, Hernandez-Castro J, Gibson SJ (2013) Source smartphone identification using sensor pattern noise and wavelet transform. In: 5th International Conference on Imaging for Crime Detection and Prevention (ICDP 2013). pp 1–6. https://doi.org/10.1049/ic.2013.0267

  32. Costanzo A, Barni M (2016) Detection of double AVC/HEVC encoding. In: 24th European Signal Processing Conference (EUSIPCO). IEEE, pp 2245–2249. https://doi.org/10.1109/EUSIPCO.2016.7760648

  33. D’Amiano L, Cozzolino D, Poggi G, Verdoliva L (2015) Video forgery detection and localization based on 3D patchmatch. In: 2015 IEEE international conference on Multimedia & Expo Workshops (ICMEW). IEEE, pp 1–6

  34. D’Amiano L, Cozzolino D, Poggi G, Verdoliva L (2018) A patchmatch-based dense-field algorithm for video copy–move detection and localization. IEEE Trans Circuits Syst Vid Technol 29:669–682

    Article  Google Scholar 

  35. D’Avino D, Cozzolino D, Poggi G, Verdoliva L (2017) Autoencoder with recurrent neural networks for video forgery detection. IS T Int Symp Electron Imaging Sci Technol 92–99. https://doi.org/10.2352/ISSN.2470-1173.2017.7.MWSF-330

  36. Das S, Chatterjee A, Dey S, Saha S, Malakar S (2023) Breast cancer detection from histology images using deep feature selection. In: Proceedings of International Conference on Frontiers in Computing and Systems. Springer, pp 323–330

  37. DERF’s collection (2022) https://media.xiph.org/video/derf/. Accessed 30 Sep 2022

  38. Dey S, Roychoudhury R, Malakar S, Sarkar R (2022) An optimized fuzzy ensemble of convolutional neural networks for detecting tuberculosis from chest X-ray images. Appl Soft Comput 114:108094

    Article  Google Scholar 

  39. Dey C, Bose R, Ghosh KK, Malakar S, Sarkar R (2022) LAGOA: learning automata based grasshopper optimization algorithm for feature selection in disease datasets. J Ambient Intell Humaniz Comput 13:3175–3194

    Article  Google Scholar 

  40. Dirik AE, Sencar HT, Memon N (2008) Digital single lens reflex camera identification from traces of sensor dust. IEEE Trans Inf Forensic Secur 3:539–552

    Article  Google Scholar 

  41. Dolhansky B, Bitton J, Pflaum B, Lu J, Howes R, Wang M, Ferrer, CC (2020) The deepfake detection challenge (dfdc) dataset. arXiv Prepr arXiv200607397

  42. Donahue J, Hendricks LA, Guadarrama S, Rohrbach M, Venugopalan S, Saenko K, Darrell T (2015) Long-term recurrent convolutional networks for visual recognition and description. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. pp 2625–2634

  43. Elrowayati AA, Abdullah MFL, Manaf AA, Alfagi AS (2017) Tampering detection of double-compression with the same quantization parameter in HEVC video streams. In: 2017 7th IEEE international conference on control system, Computing and Engineering (ICCSCE). IEEE, pp 174–179

  44. Fadl S, Han Q, Qiong L (2020) Exposing video inter-frame forgery via histogram of oriented gradients and motion energy image. Multidim Syst Signal Process 31:1365–1384

  45. Fadl S, Megahed A, Han Q, Qiong L (2020) Frame duplication and shuffling forgery detection technique in surveillance videos based on temporal average and gray level co-occurrence matrix. Multimed Tools Appl 79:17619–17643

  46. Fadl S, Han Q, Li Q (2021) CNN spatiotemporal features and fusion for surveillance video forgery detection. Signal Process Image Commun 90:116066. https://doi.org/10.1016/j.image.2020.116066

    Article  Google Scholar 

  47. Fayyaz MA, Anjum A, Ziauddin S, Khan A, Sarfaraz A (2020) An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues. Multimed Tools Appl 79:5767–5788

    Article  Google Scholar 

  48. Feng C, Xu Z, Jia S, Zhang W, Xu Y (2016) Motion-adaptive frame deletion detection for digital video forensics. IEEE Trans Circuits Syst Vid Technol 27:2543–2554

    Article  Google Scholar 

  49. Ganguly S, Mohiuddin S, Malakar S, Cuevas E, Sarkar R (2022) Visual attention-based deepfake video forgery detection. Pattern Anal Appl 25(4):981–992

  50. Ganguly S, Ganguly A, Mohiuddin S, Malakar S, Sarkar R (2022) ViXNet: vision transformer with Xception network for deepfakes based video and image forgery detection. Expert Syst Appl 210:118423

    Article  Google Scholar 

  51. GRIP (2022) http://www.grip.unina.it/. Accessed 30 Sep 2022

  52. Güera D, Delp EJ (2018) Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE international conference on advanced video and signal based surveillance (AVSS). IEEE, pp 1–6

  53. Gupta A, Gupta S, Mehra A (2015) Video authentication in digital forensic. In: 2015 international conference on futuristic trends on computational analysis and knowledge management (ABLAZE). IEEE, pp 659–663

  54. He P, Jiang X, Sun T, Wang S, Li B, Dong Y (2017) Frame-wise detection of relocated I-frames in double compressed H. 264 videos based on convolutional neural network. J Vis Commun Image Represent 48:149–158

    Article  Google Scholar 

  55. Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9:1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735

    Article  Google Scholar 

  56. Hodge V, Austin J (2004) A survey of outlier detection methodologies. Artif Intell Rev 22:85–126

    Article  MATH  Google Scholar 

  57. Hong JH, Yang Y, Oh BT (2019) Detection of frame deletion in HEVC-coded video in the compressed domain. Digit Investig 30:23–31

    Article  Google Scholar 

  58. Hsu C-C, Hung T-Y, Lin C-W, Hsu C-T (2008) Video forgery detection using correlation of noise residue. In: 2008 IEEE 10th workshop on multimedia signal processing. IEEE, pp 170–174

  59. Huang M, Wang R, Xu J, et al (2015) Detection of double compression for HEVC videos based on the co-occurrence matrix of DCT coefficients. In: International Workshop on Digital Watermarking. Springer, pp 61–71

  60. Huang CC, Zhang Y, Thing VLL (2017) Inter-frame video forgery detection based on multi-level subtraction approach for realistic video forensic applications. In: 2017 IEEE 2nd international conference on signal and image processing (ICSIP). IEEE, pp 20–24

  61. Huang CC, Lee CE, Thing VLLL (2020) A novel video forgery detection model based on triangular polarity feature classification. Int J Digit Crime Forensic 12:14–34. https://doi.org/10.4018/IJDCF.2020010102

    Article  Google Scholar 

  62. Hyun D-K, Ryu S-J, Lee H-Y, Lee H-K (2013) Detection of upscale-crop and partial manipulation in surveillance video based on sensor pattern noise. Sensors 13:12605–12631

    Article  Google Scholar 

  63. Hyun D-K, Lee M-J, Ryu S-J, et al (2013) Forgery detection for surveillance video. In: The Era of Interactive Media. Springer, pp 25–36

  64. Iglewicz B, Hoaglin D (1993) Volume 16: how to detect and handle outliers. In: the ASQC basic references in quality control: statistical techniques. Quality Press, Welshpool

  65. Ismael Al-Sanjary O, Ahmed AA, Sulong G (2016) Development of a video tampering dataset for forensic investigation. Forensic Sci Int 266:565–572. https://doi.org/10.1016/j.forsciint.2016.07.013

    Article  Google Scholar 

  66. IVY LAB (2022) http://ivylabdb.kaist.ac.kr/base/dataset/data.php. Accessed 30 Sep 2022

  67. Jia S, Xu Z, Wang H et al (2018) Coarse-to-fine copy-move forgery detection for video forensics. IEEE Access 6:25323–25335

    Article  Google Scholar 

  68. Jiang X, Wang W, Sun T, Shi YQ, Wang S (2013) Detection of double compression in MPEG-4 videos based on Markov statistics. IEEE Signal Process Lett 20:447–450

    Article  Google Scholar 

  69. Jiang X, He P, Sun T, Wang R (2019) Detection of double compressed HEVC videos using GOP-based PU type statistics. IEEE Access 7:95352–95363

    Google Scholar 

  70. Johnston P, Elyan E (2019) A review of digital video tampering: from simple editing to full synthesis. Digit Investig 29:67–81

    Article  Google Scholar 

  71. Joshi V, Jain S (2020) Tampering detection and localization in digital video using temporal difference between adjacent frames of actual and reconstructed video clip. Int J Inf Technol 12:273–282

    Google Scholar 

  72. Kancherla K, Mukkamala S (2012) Novel blind video forgery detection using markov models on motion residue. In: Asian Conference on Intelligent Information and Database Systems. Springer, pp 308–315

  73. Kang X, Liu J, Liu H, Wang ZJ (2016) Forensics and counter anti-forensics of video inter-frame forgery. Multimed Tools Appl 75:13833–13853

    Article  Google Scholar 

  74. Kaur H, Jindal N (2020) Image and video forensics: a critical survey. Wirel Pers Commun 112:1–22

    Article  Google Scholar 

  75. Kaur H, Jindal N (2020) Deep convolutional neural network for graphics forgery detection in video. Wirel Pers Commun 112:1763–1781. https://doi.org/10.1007/s11277-020-07126-3

    Article  Google Scholar 

  76. Kaur R, Kaur EJ (2016) Video forgery detection using hybrid techniques. International Journal of Advanced Research in Computer and Communication Engineering 5(12):112–117. https://doi.org/10.17148/IJARCCE.2016.51221

  77. Kay SM (1993) Fundamentals of statistical signal processing: estimation theory. Prentice Hall PTR

  78. Kerekes RA, Vijaya Kumar BVK (2006) Correlation filters with controlled scale response. IEEE Trans Image Process 15(7):1794–1802. https://doi.org/10.1109/TIP.2006.873468

  79. Kharat J, Chougule S (2020) A passive blind forgery detection technique to identify frame duplication attack. Multimed Tools Appl 79(11–12):8107–8123

  80. Kingra S, Aggarwal N, Singh RD (2016) Video inter-frame forgery detection: a survey. Indian J Sci Technol 9(44):1–9

  81. Kingra S, Aggarwal N, Singh RD (2017) Video Inter-frame Forgery Detection Approach for Surveillance and Mobile Recorded Videos Int J Electr Comput Eng 7(2):831

  82. Kirchner M, Johnson C (2020) Spn-cnn: boosting sensor-based source camera attribution with deep learning. In: IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp 1–6

  83. Kohli A, Gupta A, Singhal D (2020) CNN based localisation of forged region in object-based forgery for HD videos. IET Image Process 14(5):947–958

  84. Kono K, Yoshida T, Ohshiro S, Babaguchi N (2018) Passive video forgery detection considering Spatio-temporal consistency. In: International Conference on Soft Computing and Pattern Recognition. Springer, pp 381–391

  85. Korshunov P, Marcel S (2018) Deepfakes: a new threat to face recognition? Assessment and detection. arXiv Prepr arXiv181208685

  86. Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural networks. Communications of the ACM 60(6):84–90

  87. Kumar V, Gaur M (2022) Deep feature based forgery detection in video using parallel convolutional neural network: VFID-net. Multimed Tools Appl 81(29):42223–42240

  88. Kumar V, Gaur M (2022) Multiple forgery detection in video using inter-frame correlation distance with dual-threshold. Multimed Tools Appl 81:43979–43998

  89. LASIESTA dataset (2022) https://computervisiononline.com/dataset/1105138810. Accessed 30 Sep 2022

  90. Li C-T (2010) Source camera identification using enhanced sensor pattern noise. IEEE Trans Inf Forensic Secur 5:280–287

    Article  Google Scholar 

  91. Li ZH, Jia R, Zhang ZZ, Liang, XY, Wang JW (2017) Double HEVC compression detection with different bitrates based on co-occurrence matrix of PU types and DCT coefficients. In: ITM web of conferences. EDP Sciences, p 01020

  92. Li Q, Wang R, Xu D (2018) Detection of double compression in HEVC videos based on TU size and quantised DCT coefficients. IET Inf Secur 13(1):1–6

    Article  Google Scholar 

  93. Li Y, Chang MC, Lyu S (2019) Exposing AI created fake videos by detecting eye blinking. In: Proceedings of the 2018 IEEE Int Work on Inf Forensics Secur (WIFS). IEEE, pp 1–7. https://doi.org/10.1109/WIFS.2018.8630787

  94. Li Y, Yang X, Sun P, et al (2020) Celeb-DF: a large-scale challenging dataset for DeepFake forensics. In: Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit (CVPR). IEEE, pp 3204–3213. https://doi.org/10.1109/CVPR42600.2020.00327

  95. Liang X, Li Z, Yang Y, Zhang Z, Zhang Y (2018) Detection of double compression for HEVC videos with fake bitrate. IEEE Access 6:53243–53253

    Article  Google Scholar 

  96. Lin CS, Tsay JJ (2014) A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digit Investig 11:120–140. https://doi.org/10.1016/j.diin.2014.03.016

    Article  Google Scholar 

  97. Lin X, Li JH, Wang SL, Liew AWC, Cheng F, Huang XS (2018) Recent advances in passive digital image security forensics: a brief review. Engineering 4(1):29–39

    Article  Google Scholar 

  98. Liu H, Li S, Bian S (2014) Detecting frame deletion in H. 264 video. In: international conference on information security practice and experience. Springer, pp 262–270

  99. Liu Y, Huang T, Liu Y (2018) A novel video forgery detection algorithm for blue screen compositing based on 3-stage foreground analysis and tracking. Multimed Tools Appl 77:7405–7427

    Article  Google Scholar 

  100. Long C, Smith E, Basharat A, Hoogs A (2017) A c3d-based convolutional neural network for frame dropping detection in a single video shot. In: 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW). IEEE, pp 1898–1906

  101. López RR, Luengo EA, Orozco ALS, Villalba LJG (2020) Digital video source identification based on Container’s structure analysis. IEEE Access 8:36363–36375

    Article  Google Scholar 

  102. Lucas BD, Kanade T (1981) Iterative image registration technique with an application to Streo vision. In: 7th international joint conference on articficial intelligence (IJCAI). HAL, pp 674–679

  103. Ma R, Chen J, Su Z (2010) MI-SIFT: Mirror and inversion invariant generalization for SIFT descriptor. In: 2010 ACM International Conference on Image and Video Retrieval (CIVR 2010). ACM Digit Lib, pp 228–235

  104. Mandelli S, Bestagini P, Tubaro S, et al (2018) Blind detection and localization of video temporal splicing exploiting sensor-based footprints. In: 2018 26th European signal processing conference (EUSIPCO). IEEE, pp 1362–1366

  105. Matern F, Riess C, Stamminger M (2019) Exploiting visual artifacts to expose deepfakes and face manipulations. In: 2019 IEEE winter applications of computer vision workshops (WACVW). IEEE, pp 83–92

  106. Mizher MA, Ang MC, Mazhar AA, Mizher MA (2017) A review of video falsifying techniques and video forgery detection techniques. Int J Electron Secur Digit Forensic 9:191–208

    Article  Google Scholar 

  107. Mohiuddin S, Malakar S, Sarkar R (2021) Duplicate frame detection in forged videos using sequence matching. In: Proceedings of 3rd international conference on computational intelligence in communications and business analytics (CICBA-2021). Springer, pp 29–41

  108. Mohiuddin S, Ganguly S, Malakar S, Kaplun D, Sarkar R (2022) A feature fusion based deep learning model for Deepfake video detection. In: International Conference on Mathematics and its Applications in new Computer Systems (MANCS-2021). Springer, pp 197–206

  109. Nguyen HH, Yamagishi J, Echizen I (2019) Capsule-forensics: using capsule networks to detect forged images and videos. In: 2019 IEEE international conference on acoustics, Speech and Signal Processing (ICASSP-2019). IEEE, pp 2307–2311

  110. NTHU Forensics project (2022) http://www.ee.nthu.edu.tw/cwlin/forensics/forensics.html. Accessed 30 Sep 2022

  111. Panchal HD, Shah HB (2020) Video tampering dataset development in temporal domain for video forgery authentication. Multimed Tools Appl 79:24553–24577. https://doi.org/10.1007/s11042-020-09205-w

    Article  Google Scholar 

  112. Pandey RC, Singh SK, Shukla KK (2014) Passive copy-move forgery detection in videos. In: 2014 international conference on computer and communication technology (ICCCT). IEEE, pp 301–306

  113. Park JY, Lim JH, Kim GS, Won CS (2002) Invertible semi-fragile watermarking algorithm distinguishing MPEG-2 compression from malicious manipulation. In: 2002 digest of technical papers. International conference on consumer electronics (IEEE cat. No. 02CH37300). IEEE, pp 18–19

  114. Paul A, Pramanik R, Malakar S, Sarkar R (2022) An ensemble of deep transfer learning models for handwritten music symbol recognition. Neural Comput & Applic 34:10409–10427

    Article  Google Scholar 

  115. Pramanik R, Dey S, Malakar S, Mirjalili S, Sarkar R (2022) TOPSIS aided ensemble of CNN models for screening COVID-19 in chest X-ray images. Sci Rep 12(1):15409

    Article  Google Scholar 

  116. Qadir G, Yahaya S, Ho AT (2012) Surrey university library for forensic analysis (SULFA) of video content. In: IET Conference on Image Processing (IPR 2012). http://sulfa.cs.surrey.ac.uk/index.php. Accessed 30 Sep 2022

  117. Recognition of human actions (2022) https://www.csc.kth.se/cvap/actions/. Accessed 30 Sep 2022

  118. REWIND Database (2022) https://sites.google.com/site/rewindpolimi/downloads/datasets. Accessed 30 Sep 2022

  119. Rocha A, Scheirer W, Boult T, Goldenstein S (2011) Vision of the unseen: current trends and challenges in digital image and video forensics. ACM Comput Surv 43(4):1–42

    Article  Google Scholar 

  120. Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nießner M (2019) Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE/CVF International Conference on Computer Vision. IEEE, pp 1–11

  121. Roy S, Bhattacharya A, Sarkar N, Malakar S, Sarkar R (2020) Offline hand-drawn circuit component recognition using texture and shape-based features. Multimed Tools Appl 79:31353–31373

  122. Roy S, Sarkar D, Malakar S, Sarkar R (2021) Offline signature verification system: a graph neural network based approach. J ambient Intell Humaniz Comput 1–11. https://doi.org/10.1007/s12652-021-03592-0

  123. Saddique M, Asghar K, Bajwa UI, Hussain M, Habib Z (2019) Spatial video forgery detection and localization using texture analysis of consecutive frames. Advances in Electrical and Computer Engg 19(3):97–108

  124. Saddique M, Asghar K, Bajwa UI, Hussain M, Aboalsamh HA, Habib Z (2020) Classification of authentic and tampered video using motion residual and parasitic layers. IEEE Access 8:56782–56797. https://doi.org/10.1109/ACCESS.2020.2980951

    Article  Google Scholar 

  125. Sah AK, Bhowmik S, Malakar S, Sarkar R, Kavallieratou E, Vasilopoulos N (2018) Text and non-Text recognition using modified HOG descriptor. In: Proceedings of IEEE Calcutta Conference (CALCON 2017). IEEE, pp 64–68. https://doi.org/10.1109/CALCON.2017.8280697

  126. Sarkar S, Ghosh M, Chatterjee A, Malakar S, Sarkar R (2019) An advanced particle swarm optimization based feature selection method for tri-script handwritten digit recognition. In: Proceedings of Second International Conference on Computational Intelligence, Communications, and Business Analytics. Springer Singapore, pp 27–28

  127. Sawant R, Sabnis M (2018) A review of video forgery and its detection. J Comput Eng 20(2):1–4

  128. Shanableh T (2013) Detection of frame deletion for digital video forensics. Digit Investig 10:350–360

    Article  Google Scholar 

  129. Shaw SS, Ahmed S, Malakar S, Garcia-Hernandez L, Abraham A, Sarkar R (2021) Hybridization of ring theory-based evolutionary algorithm and particle swarm optimization to solve class imbalance problem. Complex Intell Syst 7:2069–2091

    Article  Google Scholar 

  130. Shaw SS, Ahmed S, Malakar S, Sarkar R (2021) An ensemble approach for handling class imbalanced disease datasets. In: Proceedings of International Conference on Machine Intelligence and Data Science Applications. Springer, pp 345–355

  131. Shelke NA, Kasana SS (2021) A comprehensive survey on passive techniques for digital video forgery detection. Multimed Tools Appl 80:6247–6310

    Article  Google Scholar 

  132. Shelke NA, Kasana SS (2022) Multiple forgery detection and localization technique for digital video using PCT and NBAP. Multimed Tools Appl 81:22731–22759

    Article  Google Scholar 

  133. Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: 3rd international conference on learning representations (ICLR 2015). https://doi.org/10.48550/arXiv.1409.1556

  134. Singh RD, Aggarwal N (2015) Detection of re-compression, transcoding and frame-deletion for digital video authentication. In: 2nd international conference on recent advances in Engineering Computational Sciences (RAECS 2015). IEEE, pp 1–6

  135. Singh RD, Aggarwal N (2017) Detection of upscale-crop and splicing for digital video authentication. Digital Investigation 21:31–52

    Article  Google Scholar 

  136. Singh RD, Aggarwal N (2018) Video content authentication techniques: a comprehensive survey. Multimedia Systems 24:211–240. https://doi.org/10.1007/s00530-017-0538-9

    Article  Google Scholar 

  137. Singh G, Singh K (2019) Video frame and region duplication forgery detection based on correlation coefficient and coefficient of variation. Multimed Tools Appl 78:11527–11562. https://doi.org/10.1007/s11042-018-6585-1

    Article  Google Scholar 

  138. Singh G, Singh K (2022) Chroma key foreground forgery detection under various attacks in digital video based on frame edge identification. Multimed Tools Appl 81:1419–1446

    Article  Google Scholar 

  139. Su L, Li C (2018) A novel passive forgery detection algorithm for video region duplication. Multidim Syst Sign Process 29:1173–1190. https://doi.org/10.1007/s11045-017-0496-6

    Article  MathSciNet  MATH  Google Scholar 

  140. Su L, Li C, Lai Y, Yang J (2017) A fast forgery detection algorithm based on exponential-Fourier moments for video region duplication. IEEE Trans Multimed 20:825–840

    Article  Google Scholar 

  141. Su L, Luo H, Wang S (2019) A novel forgery detection algorithm for video foreground removal. IEEE Access 7:109719–109728. https://doi.org/10.1109/access.2019.2933871

    Article  Google Scholar 

  142. Subramanyam AV, Emmanuel S (2013) Pixel estimation based video forgery detection. In: 2013 IEEE international conference on acoustics, Speech and Signal Processing. IEEE, pp 3038–3042

  143. Sun T, Wang W, Jiang X (2012) Exposing video forgeries by detecting MPEG double compression. In: IEEE international conference on acoustics, Speech and Signal Processing (ICASSP 2012). IEEE, pp 1389–1392

  144. Suwajanakorn S, Seitz SM, Kemelmacher-Shlizerman I (2017) Synthesizing obama: learning lip sync from audio. ACM Transactions on Graphics (ToG) 36(4):1–13

  145. TREC Video Retrieval Evaluation (2022) http://trecvid.nist.gov/. Accessed 30 Sep 2022

  146. Verdoliva L (2020) Media forensics and deepfakes: an overview. IEEE J Sel Top Signal Process 14:910–932

    Article  Google Scholar 

  147. Video Inpainting Under Camera Motion (2022) http://www.tc.umn.edu/~patw0007/video-inpainting/. Accessed 30 Sep 2022

  148. Video Motion Interpolation for Special Effect (2022) http://member.mine.tku.edu.tw/www/TSMC09/. Accessed 30 Sep 2022

  149. Video Trace Library (2022) http://trace.eas.asu.edu/. Accessed 30 Sep 2022

  150. Wang W, Farid H (2006) Exposing digital forgeries in video by detecting double MPEG compression. In: Proceedings of the 8th workshop on multimedia and security. ACM Digital Library, pp 37–47

  151. Wang W, Farid H (2009) Exposing digital forgeries in video by detecting double quantization. In: proceedings of the 11th ACM workshop on multimedia and security, pp 39–48

  152. Wang W, Jiang X, Wang S, Wan M, Sun T (2013) Identifying video forgery process using optical flow. In: International Workshop on Digital Watermarking. Springer, pp 244–257

  153. Wu Y, Jiang X, Sun T, Wang W (2014) Exposing video inter-frame forgery based on velocity field consistency. In: IEEE international conference on acoustics, speech and signal processing (ICASSP 2014). IEEE, pp 2674–2678

  154. Xiaozhong P, Haoming W (2012) The detection method of image regional forgery based DWT and 2DIMPCA. In: Advanced Materials Research. Trans Tech Publications Ltd, pp 692–696

  155. Xu J, Yu Y, Su Y, Dong B, You X (2012) Detection of blue screen special effects in videos. Phys Procedia 33:1316–1322

    Article  Google Scholar 

  156. Xu J, Su Y, Liu Q (2013) Detection of double MPEG-2 compression based on distributions of DCT coefficients. Int J Pattern Recognit Artif Intell 27:1354001

    Article  MathSciNet  Google Scholar 

  157. Xu Q, Sun T, Jiang X, Dong Y (2017) HEVC double compression detection based on SN-PUPM feature. In: International Workshop on Digital Watermarking. Springer, pp 3–17

  158. Yao Y, Shi Y, Weng S, Guan B (2018) Deep learning for detection of object-based forgery in advanced video. Symmetry (Basel) 10(1):1–10

    Google Scholar 

  159. Yin P, Yu HH (2001) Classification of video tampering methods and countermeasures using digital watermarking. In: Proceedings of International Symposium on the Convergence of IT and Communications. SPIE, pp 239–246

  160. YouTube [HD] (2022) https://www.youtube.com/watch?v=66Ob1aJedHc&t=14s. Accessed 30 Sep 2022

  161. Yu L, Yang Y, Li Z et al (2019) HEVC double compression detection under different bitrates based on TU partition type. EURASIP J Image Vid Process 2019(1):1–12

    Google Scholar 

  162. Yu Y, Yao H, Ni R, Zhao Y (2020) Detection of fake high definition for HEVC videos based on prediction mode feature. Signal Process 166:107269

    Article  Google Scholar 

  163. Yuan Z, Chen H, Li T, Liu J, Wang S (2021) Fuzzy information entropy-based adaptive approach for hybrid feature outlier detection. Fuzzy Sets Syst 421:1–28

    Article  MathSciNet  Google Scholar 

  164. YUV Dataset (2022) http://www.trace.eas.asu.edu/yuv/index.html. Accessed 30 Sep 2022

  165. Zhang K, Zhang L, Yang M-H (2014) Fast compressive tracking. IEEE Trans Pattern Anal Mach Intell 36(10):2002–2015

  166. Zhang Z, Hou J, Ma Q, Li Z (2015) Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames. Secur Commun Netw 8:311–320

    Article  Google Scholar 

  167. Zhao D-N, Wang R-K, Lu Z-M (2018) Inter-frame passive-blind forgery detection for video shot based on similarity analysis. Multimed Tools Appl 77:25389–25408

    Article  Google Scholar 

  168. Zheng L, Sun T, Shi Y-Q (2014) Inter-frame video forgery detection based on block-wise brightness variance descriptor. In: International Workshop on Digital Watermarking. Springer, pp 18–30

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Munish Kumar.

Ethics declarations

Research involving human participants and/or animals

No human and animal participants were used.

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this article.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mohiuddin, S., Malakar, S., Kumar, M. et al. A comprehensive survey on state-of-the-art video forgery detection techniques. Multimed Tools Appl 82, 33499–33539 (2023). https://doi.org/10.1007/s11042-023-14870-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14870-8

Keywords

Navigation