scholarly journals Digital Video Tampering Detection and Localization: Review, Representations, Challenges and Algorithm

Mathematics ◽  
2022 ◽  
Vol 10 (2) ◽  
pp. 168
Author(s):  
Naheed Akhtar ◽  
Mubbashar Saddique ◽  
Khurshid Asghar ◽  
Usama Ijaz Bajwa ◽  
Muhammad Hussain ◽  
...  

Digital videos are now low-cost, easy to capture and easy to share on social media due to the common feature of video recording in smart phones and digital devices. However, with the advancement of video editing tools, videos can be tampered (forged) easily for propaganda or to gain illegal advantages—ultimately, the authenticity of videos shared on social media cannot be taken for granted. Over the years, significant research has been devoted to developing new techniques for detecting different types of video tampering. In this paper, we offer a detailed review of existing passive video tampering detection techniques in a systematic way. The answers to research questions prepared for this study are also elaborated. The state-of-the-art research work is analyzed extensively, highlighting the pros and cons and commonly used datasets. Limitations of existing video forensic algorithms are discussed, and we conclude with research challenges and future directions.

Digital images and videos are widely used in various fields like courtrooms ,military ,medicine ,research, social media etc. So, maintaining the authenticity and integrity of these digital contents is a major concern. For the past few years, researches were going on to find out tampering in the digital contents. Active and passive approaches are the major classification for digital tampering detection. Here, we discuss some of the active and passive approaches and their significance in the current scenario.


Author(s):  
Ramesh Chand Pandey ◽  
Sanjay Kumar Singh ◽  
K. K. Shukla

With increasing availability of low-cost video editing softwares and tools, the authenticity of digital video can no longer be trusted. Active video tampering detection technique utilize digital signature or digital watermark for the video tampering detection, but when the videos do not include such signature then it is very challenging to detect tampering in such video. To detect tampering in such video, passive video tampering detection techniques are required. In this chapter we have explained passive video tampering detection by using noise features. When video is captured with camera it passes through a Camera processing pipeline and this introduces noise in the video. Noise changes abruptly from authentic to forged frame blocks and provides a clue for video tampering detection. For extracting the noise we have considered different techniques like denoising algorithms, wavelet based denoising filter, and neighbor prediction.


Author(s):  
Aditi Shedge ◽  
Shaily Shah ◽  
Shubham Pandey ◽  
Mansi Pandey ◽  
Rupali Satpute

A human brain responds at a much faster rate to images and the information it contains. An image is considered as proof of past events that have occurred, but in today's world where editing tools are made available so easily tampering of images and hiding the original content has become too mainstream. The identification of these tampered images is very important as images are considered as vital sources of information in crime investigation and in various other fields. The image forgery detection techniques check the credibility of the image. Various research has been carried out in dealing with image forgery and tampering detection techniques, this paper highlights various the type of forgery and how they can be detected using various techniques. The fusion of various algorithms so that a complete reliable type of algorithm can be developed to deal mainly with copy-move and image splicing forgery. The copy-move and image splicing method are main focus of this paper.


Author(s):  
Fulpagare Priya K. ◽  
Nitin N. Patil

Social Network is an emerging e-service for Content Sharing Sites (CSS). It is an emerging service which provides reliable communication. Some users over CSS affect user’s privacy on their personal contents, where some users keep on sending annoying comments and messages by taking advantage of the user’s inherent trust in their relationship network. Integration of multiple user’s privacy preferences is very difficult task, because privacy preferences may create conflict. The techniques to resolve conflicts are essentially required. Moreover, these methods need to consider how users would actually reach an agreement about a solution to the conflict in order to offer solutions acceptable by all of the concerned users. The first mechanism to resolve conflicts for multi-party privacy management in social media that is able to adapt to different situations by displaying the enterprises that users make to reach a result to the conflicts. Billions of items that are uploaded to social media are co-owned by multiple users. Only the user that uploads the item is allowed to set its privacy settings (i.e. who can access the item). This is a critical problem as users’ privacy preferences for co-owned items can conflict. Multi-party privacy management is therefore of crucial importance for users to appropriately reserve their privacy in social media.


Author(s):  
Meghan Lynch ◽  
Irena Knezevic ◽  
Kennedy Laborde Ryan

To date, most qualitative knowledge about individual eating patterns and the food environment has been derived from traditional data collection methods, such as interviews, focus groups, and observations. However, there currently exists a large source of nutrition-related data in social media discussions that have the potential to provide opportunities to improve dietetic research and practice. Qualitative social media discussion analysis offers a new tool for dietetic researchers and practitioners to gather insights into how the public discusses various nutrition-related topics. We first consider how social media discussion data come with significant advantages including low-cost access to timely ways to gather insights from the public, while also cautioning that social media data have limitations (e.g., difficulty verifying demographic information). We then outline 3 types of social media discussion platforms in particular: (i) online news article comment sections, (ii) food and nutrition blogs, and (iii) discussion forums. We discuss how each different type of social media offers unique insights and provide a specific example from our own research using each platform. We contend that social media discussions can contribute positively to dietetic research and practice.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 517
Author(s):  
Seong-heum Kim ◽  
Youngbae Hwang

Owing to recent advancements in deep learning methods and relevant databases, it is becoming increasingly easier to recognize 3D objects using only RGB images from single viewpoints. This study investigates the major breakthroughs and current progress in deep learning-based monocular 3D object detection. For relatively low-cost data acquisition systems without depth sensors or cameras at multiple viewpoints, we first consider existing databases with 2D RGB photos and their relevant attributes. Based on this simple sensor modality for practical applications, deep learning-based monocular 3D object detection methods that overcome significant research challenges are categorized and summarized. We present the key concepts and detailed descriptions of representative single-stage and multiple-stage detection solutions. In addition, we discuss the effectiveness of the detection models on their baseline benchmarks. Finally, we explore several directions for future research on monocular 3D object detection.


2021 ◽  
Vol 4 (1) ◽  
Author(s):  
James T. H. Teo ◽  
Vlad Dinu ◽  
William Bernal ◽  
Phil Davidson ◽  
Vitaliy Oliynyk ◽  
...  

AbstractAnalyses of search engine and social media feeds have been attempted for infectious disease outbreaks, but have been found to be susceptible to artefactual distortions from health scares or keyword spamming in social media or the public internet. We describe an approach using real-time aggregation of keywords and phrases of freetext from real-time clinician-generated documentation in electronic health records to produce a customisable real-time viral pneumonia signal providing up to 4 days warning for secondary care capacity planning. This low-cost approach is open-source, is locally customisable, is not dependent on any specific electronic health record system and can provide an ensemble of signals if deployed at multiple organisational scales.


2021 ◽  
Vol 5 ◽  
pp. 130-146
Author(s):  
Mikhail Bashkirov ◽  

The figure of “shaman warrior” Aleksandr Gabyshev from Yakutsk became the object of attention in social media in 2019–2020. The interest toward Gabyshev was sparked both by the goal he declared (“to drive President Vladimir Putin out of the Kremlin”) and by his peculiar personality. This article is drawn on a wide range of materials gathered in the course of research work on a visual documentary about Gabyshev. The worldview of the “shaman warrior” was a paradoxical tangle of the native Yakut culture and the Russian Orthodox culture. In many ways Gabyshev adhered to the line of behavior typical of “blessed fools” in the Russian Orthodox tradition. Indeed, his behavior and personality image could be seen as grounded in a sequence of contradictions that seemed meaningless and illogical in the context of the shamanic tradition. Yet aspects both of neoshamanism and of “blessed foolishness” were important assets that let him creatively develop his personal identity.


Author(s):  
Zahra Dyah Meilani ◽  
Ivan Muhammad Nizar ◽  
Muhamad Fikri Sunandar ◽  
Shintami Chusnul Hidayati
Keyword(s):  
Low Cost ◽  

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Kulvinder Kaur ◽  
Pawan Kumar

PurposeThe rise in the use of Internet technologies and social media has shifted the marketing practices from offline to online. This study aims to determine the pros and cons of social media marketing in the beauty and wellness industry.Design/methodology/approachIn-depth interviews were conducted with the owners and marketing executives of beauty and wellness centers to understand the use of popular social media platforms in this industry and their pros and cons.FindingsThe researchers identified eight merits and seven demerits of social media in the beauty and wellness industry. Every respondent is happy and satisfied with social media use, particularly Instagram and Facebook. Irrespective of the demerits, they have shown the intention to increase its usage in the future. The merits override demerits; thus, social media is a blessing for this industry from the owners' perspective.Research limitations/implicationsThe research is exploratory and is confined to just one industry. Research implication is that the visual nature of social media makes it a powerful tool for the promotion of the beauty and wellness industry.Practical implicationsThe study's findings will be beneficial for small-scale businesses as it will push them to take advantage of this low-cost marketing tool.Social implicationsSocial media marketing is helpful for communication and marketing purposes for society.Originality/valueThe beauty and wellness industry remained unfocused by researchers because it is highly unorganized, fragmented and not regulated, yet has huge growth potential. This research will provide a closer look at this industry as well as social media marketing.


Sign in / Sign up

Export Citation Format

Share Document