Frame Duplication Forgery Detection and Localization Algorithm Based on the Improved Levenshtein Distance
In this digital era of technology and software development tools, low-cost digital cameras and powerful video editing software (such as Adobe Premiere, Microsoft Movie Maker, and Magix Vegas) have become available for any common user. Through these softwares, editing the contents of digital videos b...
Uložené v:
| Vydané v: | Scientific programming Ročník 2021; s. 1 - 10 |
|---|---|
| Hlavní autori: | , , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
New York
Hindawi
2021
John Wiley & Sons, Inc |
| Predmet: | |
| ISSN: | 1058-9244, 1875-919X |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | In this digital era of technology and software development tools, low-cost digital cameras and powerful video editing software (such as Adobe Premiere, Microsoft Movie Maker, and Magix Vegas) have become available for any common user. Through these softwares, editing the contents of digital videos became very easy. Frame duplication is a common video forgery attack which can be done by copying and pasting a sequence of frames within the same video in order to hide or replicate some events from the video. Many algorithms have been proposed in the literature to detect such forgeries from the video sequences through analyzing the spatial and temporal correlations. However, most of them are suffering from low efficiency and accuracy rates and high computational complexity. In this paper, we are proposing an efficient and robust frame duplication detection algorithm to detect duplicated frames from the video sequence based on the improved Levenshtein distance. Extensive experiments were performed on some selected video sequences captured by stationary and moving cameras. In the experimental results, the proposed algorithm showed efficacy compared with the state-of-the-art techniques. |
|---|---|
| AbstractList | In this digital era of technology and software development tools, low-cost digital cameras and powerful video editing software (such as Adobe Premiere, Microsoft Movie Maker, and Magix Vegas) have become available for any common user. Through these softwares, editing the contents of digital videos became very easy. Frame duplication is a common video forgery attack which can be done by copying and pasting a sequence of frames within the same video in order to hide or replicate some events from the video. Many algorithms have been proposed in the literature to detect such forgeries from the video sequences through analyzing the spatial and temporal correlations. However, most of them are suffering from low efficiency and accuracy rates and high computational complexity. In this paper, we are proposing an efficient and robust frame duplication detection algorithm to detect duplicated frames from the video sequence based on the improved Levenshtein distance. Extensive experiments were performed on some selected video sequences captured by stationary and moving cameras. In the experimental results, the proposed algorithm showed efficacy compared with the state-of-the-art techniques. |
| Author | Emam, Mahmoud Ren, Honge Atwa, Walid Zhang, Haosu Muhammad, Shafiq |
| Author_xml | – sequence: 1 givenname: Honge orcidid: 0000-0002-5334-7636 surname: Ren fullname: Ren, Honge organization: College of Information and Computer EngineeringNortheast Forestry UniversityHarbin 150040Chinanefu.edu.cn – sequence: 2 givenname: Walid surname: Atwa fullname: Atwa, Walid organization: Department of Computer ScienceFaculty of Computers and InformationMenoufia UniversityShebin El-Koom 32511Egyptmenofia.edu.eg – sequence: 3 givenname: Haosu surname: Zhang fullname: Zhang, Haosu organization: Heilongjiang Forestry Intelligent Equipment Engineering Research CenterHarbin 150040China – sequence: 4 givenname: Shafiq surname: Muhammad fullname: Muhammad, Shafiq organization: Cyberspace Institute of Advance TechnologyGuangzhou UniversityGuangzhouChinagzhu.edu.cn – sequence: 5 givenname: Mahmoud orcidid: 0000-0002-1290-4272 surname: Emam fullname: Emam, Mahmoud organization: Department of Mathematics and Computer ScienceFaculty of ScienceMenoufia UniversityShebin El-Koom 32511Egyptmenofia.edu.eg |
| BookMark | eNp9kEFPwkAQhTcGEwG9-QM28aiVnW2XtkcEUZImXjTx1qzbgS5pt7i7YPDXWygnEz3NzMs38yZvQHqmMUjINbB7ACFGnHEYCZGKRLAz0ockFkEK6Xuv7ZlIgpRH0QUZOLdmDBJgrE_03Moa6Wy7qbSSXjeGzhu7QrunM_Sojoo0Bc0aJSv93SGTatVY7cuaPkiHBW0lXyJd1Bvb7No5wx0aV3rUhs6089IovCTnS1k5vDrVIXmbP75On4Ps5WkxnWSBCsPYB-OkiJWEJOQfMk3CJU8hlqgQIh4VHNMCkrHAqAh5AThGIVDIVpYMWIhMhuGQ3HR3218-t-h8vm621rSWORfAUhEziFrqrqOUbZyzuMw3VtfS7nNg-SHM_BBmfgqzxfkvXGl_zMJbqau_lm67pVKbQn7p_y1-ACRQhj8 |
| CitedBy_id | crossref_primary_10_1007_s11277_024_10996_6 crossref_primary_10_1007_s11042_025_20769_3 crossref_primary_10_1007_s40031_024_00995_3 crossref_primary_10_1088_2631_8695_ae0252 crossref_primary_10_1111_1556_4029_15516 crossref_primary_10_1111_1556_4029_70043 crossref_primary_10_1007_s11042_023_14602_y |
| Cites_doi | 10.1007/978-3-642-41407-7_7 10.1016/j.future.2020.02.017 10.1109/JIOT.2020.3002255 10.1109/TCSVT.2018.2804768 10.1016/j.cose.2020.101863 10.1016/j.ijleo.2012.11.078 10.1109/access.2018.2819624 10.1142/s0218001412500176 10.1016/j.eswa.2018.07.076 10.1016/j.diin.2012.07.002 10.1145/359038.359041 10.1109/34.232078 10.1016/j.diin.2016.08.002 10.1109/tip.2003.819861 10.1006/cviu.1999.0764 10.1016/j.trc.2020.01.005 10.1016/j.cviu.2016.08.005 10.1016/j.diin.2016.06.003 10.1587/transinf.2016edl8024 10.1007/s11042-014-2374-7 10.1145/375360.375365 10.1109/ICCSE.2011.6028891 10.1016/j.forsciint.2013.05.027 10.1016/0022-0000(80)90002-1 |
| ContentType | Journal Article |
| Copyright | Copyright © 2021 Honge Ren et al. Copyright © 2021 Honge Ren et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| Copyright_xml | – notice: Copyright © 2021 Honge Ren et al. – notice: Copyright © 2021 Honge Ren et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| DBID | RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1155/2021/5595850 |
| DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database CrossRef |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1875-919X |
| Editor | Ali, Sikandar |
| Editor_xml | – sequence: 1 givenname: Sikandar surname: Ali fullname: Ali, Sikandar |
| EndPage | 10 |
| ExternalDocumentID | 10_1155_2021_5595850 |
| GrantInformation_xml | – fundername: Northeast Forestry University grantid: 203822 – fundername: Fundamental Research Funds for the Central Universities grantid: 2572018BH09; 2572017PZ10 |
| GroupedDBID | .4S .DC 0R~ 4.4 5VS AAFWJ AAJEY ABDBF ABJNI ACGFS ADBBV AENEX ALMA_UNASSIGNED_HOLDINGS ARCSS ASPBG AVWKF BCNDV DU5 EAD EAP EBS EDO EMK EPL EST ESX GROUPED_DOAJ HZ~ I-F IAO IHR IOS KQ8 MIO MK~ ML~ MV1 NGNOM O9- OK1 RHU RHW RHX TUS 24P AAMMB AAYXX ACCMX AEFGJ AGXDD AIDQK AIDYY ALUQN CITATION H13 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c337t-68d7ca1832ba983f2917aece1424d2e9d1865e4d32d1e6e55e5a2e9a0103e0a33 |
| IEDL.DBID | RHX |
| ISICitedReferencesCount | 8 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000640269800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1058-9244 |
| IngestDate | Fri Jul 25 09:29:52 EDT 2025 Sat Nov 29 04:06:57 EST 2025 Tue Nov 18 21:51:55 EST 2025 Sun Jun 02 19:18:03 EDT 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c337t-68d7ca1832ba983f2917aece1424d2e9d1865e4d32d1e6e55e5a2e9a0103e0a33 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-5334-7636 0000-0002-1290-4272 |
| OpenAccessLink | https://dx.doi.org/10.1155/2021/5595850 |
| PQID | 2510957014 |
| PQPubID | 2046410 |
| PageCount | 10 |
| ParticipantIDs | proquest_journals_2510957014 crossref_primary_10_1155_2021_5595850 crossref_citationtrail_10_1155_2021_5595850 hindawi_primary_10_1155_2021_5595850 |
| PublicationCentury | 2000 |
| PublicationDate | 2021-00-00 |
| PublicationDateYYYYMMDD | 2021-01-01 |
| PublicationDate_xml | – year: 2021 text: 2021-00-00 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | Scientific programming |
| PublicationYear | 2021 |
| Publisher | Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
| References | 22 F. Li (15) 2014 23 W. Wang (4) 24 25 26 27 W. Wang (12) M. Emam (28) 30 10 14 16 V. K. Singh (13) 17 18 19 1 2 3 5 A. Bovik (11) 2005; 62 6 7 8 9 20 M. Emam (29) 21 |
| References_xml | – start-page: 63 volume-title: Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013) year: 2014 ident: 15 article-title: Video copy-move forgery detection and localization based on structural similarity doi: 10.1007/978-3-642-41407-7_7 – ident: 26 doi: 10.1016/j.future.2020.02.017 – ident: 25 doi: 10.1109/JIOT.2020.3002255 – ident: 17 doi: 10.1109/TCSVT.2018.2804768 – start-page: 326 ident: 28 article-title: Detection of copy-scale-move forgery in digital images using SFOP and MROGH – ident: 27 doi: 10.1016/j.cose.2020.101863 – ident: 7 doi: 10.1016/j.ijleo.2012.11.078 – ident: 9 doi: 10.1109/access.2018.2819624 – ident: 14 doi: 10.1142/s0218001412500176 – ident: 19 doi: 10.1016/j.eswa.2018.07.076 – ident: 5 doi: 10.1016/j.diin.2012.07.002 – ident: 21 doi: 10.1145/359038.359041 – ident: 23 doi: 10.1109/34.232078 – ident: 29 article-title: A passive technique for detecting copy-move forgery with rotation based on polar complex exponential transform – ident: 3 doi: 10.1016/j.diin.2016.08.002 – start-page: 29 ident: 13 article-title: Detection of frame duplication type of forgery in digital video using sub-block based features – ident: 16 doi: 10.1109/tip.2003.819861 – ident: 24 doi: 10.1006/cviu.1999.0764 – ident: 18 doi: 10.1016/j.trc.2020.01.005 – ident: 8 doi: 10.1016/j.cviu.2016.08.005 – start-page: 244 ident: 4 article-title: Identifying video forgery process using optical flow – ident: 1 doi: 10.1016/j.diin.2016.06.003 – start-page: 35 ident: 12 article-title: Exposing digital forgeries in video by detecting duplication – ident: 30 doi: 10.1587/transinf.2016edl8024 – ident: 6 doi: 10.1007/s11042-014-2374-7 – ident: 22 doi: 10.1145/375360.375365 – ident: 2 doi: 10.1109/ICCSE.2011.6028891 – volume: 62 start-page: 4632 issue: 4 year: 2005 ident: 11 article-title: Handbook of image and video processing publication-title: Sensor Review – ident: 10 doi: 10.1016/j.forsciint.2013.05.027 – ident: 20 doi: 10.1016/0022-0000(80)90002-1 |
| SSID | ssj0018100 |
| Score | 2.2501338 |
| Snippet | In this digital era of technology and software development tools, low-cost digital cameras and powerful video editing software (such as Adobe Premiere,... |
| SourceID | proquest crossref hindawi |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Algorithms Authenticity Copying Correlation analysis Digital cameras Digital video Editing Experiments Forensic sciences Forgery Frames (data processing) Localization Methods Reproduction (copying) Software Software development tools |
| Title | Frame Duplication Forgery Detection and Localization Algorithm Based on the Improved Levenshtein Distance |
| URI | https://dx.doi.org/10.1155/2021/5595850 https://www.proquest.com/docview/2510957014 |
| Volume | 2021 |
| WOSCitedRecordID | wos000640269800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1875-919X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0018100 issn: 1058-9244 databaseCode: 24P dateStart: 19920101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwEA9uKPjitzidIw_zSYrrR9r0cTrHHsYYorC3ko-bG8xO1k7_fS9tOtAh-piQtHDJ5X6_3OWOkLYKdSil4A5XInJwh2hHQBA7ERMQazYFOS1S5g-j0YhPJvHYJknKtl34aO0MPXfvEPgisEVuXuPMRG49DSYbZwF3O2XSAYa6i-aqim__Mfeb5dmbGcr7Od86ggu70j8iBxYQ0m65gsdkB9ITclgVW6BW907JvG_CqGhvvXE40_6yeNJMe5AXAVUpFammQ2Od7OtK2l28LpH-z97oPZorTbELER8trxKwPTQJnLKZKXlJewZK4r_OyEv_8flh4Ng6CY7y_Sh3Qq4jJYxuShFzf-ohBROgwDxi0x6K3OUhg0D7nnYhBMaACewWpsQDdITvn5N6ukzhglBkR0IxqSVwiUdoFIOveKCmsSu9QAbQILeVDBNlk4ibWhaLpCATjCVG4omVeIPcbEa_l8kzfhnXtsvxx7BmtVaJ1bQsQXyGKDFCpnf5v69ckX3TLK9RmqSer9ZwTXbVRz7PVi1S84Jxq9hfX0u0yF4 |
| linkProvider | Hindawi Publishing |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Frame+Duplication+Forgery+Detection+and+Localization+Algorithm+Based+on+the+Improved+Levenshtein+Distance&rft.jtitle=Scientific+programming&rft.au=Ren%2C+Honge&rft.au=Atwa%2C+Walid&rft.au=Zhang%2C+Haosu&rft.au=Muhammad%2C+Shafiq&rft.date=2021&rft.issn=1058-9244&rft.eissn=1875-919X&rft.volume=2021&rft.spage=1&rft.epage=10&rft_id=info:doi/10.1155%2F2021%2F5595850&rft.externalDBID=n%2Fa&rft.externalDocID=10_1155_2021_5595850 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1058-9244&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1058-9244&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1058-9244&client=summon |