duplication detection
Recently Published Documents


TOTAL DOCUMENTS

64
(FIVE YEARS 15)

H-INDEX

8
(FIVE YEARS 1)

2021 ◽  
pp. 1-20
Author(s):  
Himani Sharma ◽  
Navdeep Kanwal

Multimedia communication as well as other related innovations are gaining tremendous growth in the modern technological era. Even though digital content has traditionally proved to be a piece of legitimate evidence. But the latest technologies have lessened this trust, as a variety of video editing tools have been developed to modify the original video. Therefore, in order to resolve this problem, a new technique has been proposed for the detection of duplicate video sequences. The present paper utilizes gray values to extract Hu moment features in the current frame. These features are further used for classification of video as authentic or forged. Afterwards there was also need to validate the proposed technique using training and test dataset. But the scarcity of training and test datasets, however, is indeed one of the key problems to validate the effectiveness of video tampering detection techniques. In this perspective, the Video Forensics Library for Frame Duplication (VLFD) dataset has been introduced for frame duplication detection purposes. The proposed dataset is made of 210 native videos, in Ultra-HD and Full-HD resolution, captured with different cameras. Every video is 6 to 15 seconds in length and runs at 30 frames per second. All the recordings have been acquired in three different scenarios (indoor, outdoor, nature) and in landscape mode(s). VLFD includes both authentic and manipulated video files. This dataset has been created as an initial repository for manipulated video and enhanced with new features and new techniques in future.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Qi Han ◽  
Hao Chen ◽  
Liyang Yu ◽  
Qiong Li

To detect frame duplication in degraded videos, we proposed a coarse-to-fine approach based on locality-sensitive hashing and image registration. The proposed method consists of a coarse matching stage and a duplication verification step. In the coarse matching stage, visually similar frame sequences are preclustered by locality-sensitive hashing and considered as potential duplication candidates. These candidates are further checked by a duplication verification step. Being different from the existing methods, our duplication verification does not rely on a fixed distance (or correlation) threshold to judge whether two frames are identical. We resorted to image registration, which is intrinsically a global optimal matching process, to determine whether two frames coincide with each other. We integrated the stability information into the registration objective function to make the registration process more robust for degraded videos. To test the performance of the proposed method, we created a dataset, which consists of 3 subsets of different kinds of degradation and 117 forged videos in total. The experimental results show that our method outperforms state-of-the-art methods for most cases in our dataset and exhibits outstanding robustness under different conditions. Thanks to the coarse-to-fine strategy, the running time of the proposed method is also quite competitive.


2021 ◽  
Vol 192 ◽  
pp. 893-902
Author(s):  
Hussein Hazimeh ◽  
Zahraa Chreim ◽  
Ali Noureldine ◽  
Hasan Harb ◽  
Elena Mugellini ◽  
...  

Author(s):  
Choudhary Shyam Prakash ◽  
Sushila Maheshkar

In this paper, we proposed a passive method for copy-move region duplication detection using dyadic wavelet transform (DyWT). DyWT is better than discrete wavelet transform (DWT) for data analysis as it is shift invariant. Initially we decompose the input image into approximation (LL1) and detail (HH1) sub-bands. Then LL1 and HH1 sub-bands are divided into overlapping sub blocks and find the similarity between the blocks. In LL1 sub-band the copied and moved blocks have high similarity rate than the HH1 sub-band, this is just because, there is noise inconsistency in the moved blocks. Then we sort the LL1 sub-band blocks pair based on high similarity and in HH1 blocks are sorted based on high dissimilarity. Then we apply threshold to get the copied moved blocks. Here we also applied some post processing operations to check the robustness of our method and we get the satisfactory results to validate the copy move forgery detection.


2020 ◽  
pp. 741-750
Author(s):  
Choudhary Shyam Prakash ◽  
Sushila Maheshkar

In this paper, we proposed a passive method for copy-move region duplication detection using dyadic wavelet transform (DyWT). DyWT is better than discrete wavelet transform (DWT) for data analysis as it is shift invariant. Initially we decompose the input image into approximation (LL1) and detail (HH1) sub-bands. Then LL1 and HH1 sub-bands are divided into overlapping sub blocks and find the similarity between the blocks. In LL1 sub-band the copied and moved blocks have high similarity rate than the HH1 sub-band, this is just because, there is noise inconsistency in the moved blocks. Then we sort the LL1 sub-band blocks pair based on high similarity and in HH1 blocks are sorted based on high dissimilarity. Then we apply threshold to get the copied moved blocks. Here we also applied some post processing operations to check the robustness of our method and we get the satisfactory results to validate the copy move forgery detection.


2020 ◽  
Vol 12 (24) ◽  
pp. 101-105
Author(s):  
J. Prassanna ◽  
Jani L. Anbarasi ◽  
R. Prabhakaran ◽  
Kanchana Devi V ◽  
Rajiv Vincent ◽  
...  

2019 ◽  
Author(s):  
Yang Xiao ◽  
Qiang Gu ◽  
Hairong Wu ◽  
Songtao Wang ◽  
Pei Pei ◽  
...  

Abstract Background Phenylketonuria (PKU) is a genetic metabolic disease with a relatively higher incidence, but only a few studies about the prenatal diagnosis of PKU have been reported so far in China. The aim of this study was to characterize the spectrum of mutations in PAH gene in PKU probands and the prenatal diagnosis of PKU in north China.Methods A total of 157 families in which PKU patients had been diagnosed were included in the study. The 13 exons and their flanking sequences of PAH gene were amplified by PCR and sequenced in the probands. If none or only one mutant allele was found in the probands, the sample was subjected to MLPA for large deletions/duplication detection in PAH gene. Prenatal diagnosis was performed for pregnant women in these families.Results Pathogenic mutation in PAH was found in 2 alleles in 148 probands and in one allele in 7 probands, and the mutation was not detected in 2 probands. There were 289 point mutants, 10 frame-shift mutations and 4 large deletions with a total of 80 kinds of mutations. The most prevalent mutations were R243Q (17.2%), EX6-96A>G (8.6%) and V399V (8.0%). We also found a novel mutation of 163_164insATAT. Prenatal diagnosis of 95 families found 21 healthy fetus (20.4%), 52 carriers (50.5%) and 30 patients (29.1%), and the accuracy of prenatal diagnosis was confirmed after birth of the fetuses.Conclusion We present here a spectrum of mutations in PAH gene in PKU patients in north China. Prenatal diagnosis for PKU is useful for PKU families to prevent birth of another PKU case.


Sensors ◽  
2019 ◽  
Vol 19 (15) ◽  
pp. 3370 ◽  
Author(s):  
Jianhong Zhang ◽  
Peirong Ou

Nowadays, the widely deployed and high performance Internet of Things (IoT) facilitates the communication between its terminal nodes. To enhance data sharing among terminal devices and ensure the recipients’ privacy protection, a few anonymous multi-recipient broadcast encryption (AMBE) proposals are recently given. Nevertheless, the majority of these AMBE proposals are only proven be securely against adaptively chosen plain-text attack (CPA) or selectively chosen ciphertext attack (CCA). Furthermore, all AMBE proposals are subjected to key escrow issue due to inherent characteristics of the ID-based public cryptography (ID-PKC), and cannot furnish secure de-duplication detection. However, for cloud storage, it is very important for expurgating duplicate copies of the identical message since de-duplication can save the bandwidth of network and storage space. To address the above problems, in the work, we present a privacy-preserving multi-receiver certificateless broadcast encryption scheme with de-duplication (PMCBED) in the cloud-computing setting based on certificateless cryptography and anonymous broadcast encryption. In comparison with the prior AMBE proposals, our scheme has the following three characteristics. First, it can fulfill semantic security notions of data-confidentiality and receiver identity anonymity, whereas the existing proposals only accomplish them by formalizing the weaker security models. Second, it achieves duplication detection of the ciphertext for the identical message encrypted with our broadcast encryption. Finally, it also avoids the key escrow problem of the AMBE schemes.


Sign in / Sign up

Export Citation Format

Share Document