Cargando…

A comprehensive taxonomy on multimedia video forgery detection techniques: challenges and novel trends

Thousands of videos are posted on websites and social media every day, including Twitter, Facebook, WhatsApp, Instagram, and YouTube. Newspapers, law enforcement publications, criminal investigations, surveillance systems, Banking, the museum, the military, imaging in medicine, insurance claims, and...

Descripción completa

Detalles Bibliográficos
Autores principales: El-Shafai, Walid, Fouda, Mona A., El-Rabaie, El-Sayed M., El-Salam, Nariman Abd
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10205570/
https://www.ncbi.nlm.nih.gov/pubmed/37362636
http://dx.doi.org/10.1007/s11042-023-15609-1
Descripción
Sumario:Thousands of videos are posted on websites and social media every day, including Twitter, Facebook, WhatsApp, Instagram, and YouTube. Newspapers, law enforcement publications, criminal investigations, surveillance systems, Banking, the museum, the military, imaging in medicine, insurance claims, and consumer photography are just a few examples of places where important visual data may be obtained. Thus, the emergence of powerful processing tools that can be easily made available online poses a huge threat to the authenticity of videos. Therefore, it’s vital to distinguish between true and fake data. Digital video forgery detection techniques are used to validate and check the realness of digital video content. Deep learning algorithms lately sparked a lot of interest in the field of digital forensics, such as Recurrent Neural Networks (RNN), Deep Convolutional Neural Networks (DCNN), and Adaptive Neural Networks (ANN). In this paper, we give a soft taxonomy as well as a thorough overview of recent research on multimedia falsification detection systems. First, the basic knowledge needed to comprehend video forgery is provided. Then, a summary of active and passive video manipulation detection approaches is provided. Anti-forensics, compression video methods, datasets required for video forensics, and challenges of video detection approaches are also addressed. Following that, we presented an overview of deepfake, and the datasets required for detection were also provided. Also, helpful software packages and forensics tools for video detection are covered. In addition, this paper provides an overview of video analysis tools that are used in video forensic applications. Finally, we highlight research difficulties as well as interesting research avenues. In short, this survey provides detailed information and a broader investigation to extract data and detect fraud video contents under one umbrella.