IDEAS home Printed from https://ideas.repec.org/a/apb/jaterr/2019p199-206.html
   My bibliography  Save this article

Video forgery detection based-on passive (blind) approach

Author

Listed:
  • Noraida Haji Ali

    (Faculty of Ocean Engineering Technology and Informatics, Universiti Malaysia Terengganu, Terengganu, Malaysia)

  • Fadilah Harun

    (Faculty of Ocean Engineering Technology and Informatics, Universiti Malaysia Terengganu, Terengganu, Malaysia)

Abstract

Current communication technology can ease sharing multimedia data such as images, text, graphics, audio, andb videos through online or offline. A multimedia editing tool can be downloaded freely and used efficiently to be editing the content of video clips. To solve the problem of integrity and originality video clips is very challenging and requires some complex methods. How to ensure that the content or the structure of the video provided or downloaded from the internet is original and just as recorded? Video forgery is a technique to generate fake videos with malicious intent by inserting, deleting, duplication its contents. Therefore, the video's originality can be questioned and need to be verified. Video forgery detection is intended to determine the originality of video content, whether the video has undergone any unethical change process. The video forgery detection technique has two approaches, active and passive. In this study, it focuses on the detection of tampering video using a passive approach because it is not dependent on pre-embedded information to determine the originality of the video. The passive approach will be extracting this feature from the video and analyzing them for different forgery detection. A passive approach is better than the active one as it relies on fake video that is available and features and its properties without needing the original video. The research focus was to apply a passive approach to develop a new model for video forgery detection. This model will be used to build a powerful tool for detecting video authenticity. Therefore, it can help certain parties, especially those involved in legal activities.

Suggested Citation

  • Noraida Haji Ali & Fadilah Harun, 2019. "Video forgery detection based-on passive (blind) approach," Journal of Advances in Technology and Engineering Research, A/Professor Akbar A. Khatibi, vol. 5(5), pages 199-206.
  • Handle: RePEc:apb:jaterr:2019:p:199-206
    DOI: 10.20474/jater-5.5.2
    as

    Download full text from publisher

    File URL: https://tafpublications.com/platform/Articles/full-jater5.5.2.php
    Download Restriction: no

    File URL: https://tafpublications.com/gip_content/paper/Jater-5.5.2.pdf
    Download Restriction: no

    File URL: https://libkey.io/10.20474/jater-5.5.2?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Osahenvemwen, O. A & Odiase, O. F, 2016. "Effective management of handover process in mobile communication network," Journal of Advances in Technology and Engineering Research, A/Professor Akbar A. Khatibi, vol. 2(6), pages 176-182.
    2. Reni Suryanita & Harnedi Maizir & Hendra Jingga, 2017. "Prediction of Structural Response Based on Ground Acceleration Using Artificial Neural Networks," International Journal of Technology and Engineering Studies, PROF.IR.DR.Mohid Jailani Mohd Nor, vol. 3(2), pages 74-83.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Arthur Stepchenko & Jurij Chizhov & Ludmila Aleksejeva, 2018. "Transfer of the data preprocessing parameters and fore- casting models," Journal of Advances in Technology and Engineering Research, A/Professor Akbar A. Khatibi, vol. 4(6), pages 214-221.
    2. Khaled Y Alghamdi & Robin Braun, 2019. "Deploying hand offmechanism with the software defined network vs mobile IP for 5G network: A feasibility study," Journal of Advances in Technology and Engineering Research, A/Professor Akbar A. Khatibi, vol. 5(2), pages 79-84.
    3. Francesco Smarra & Giovanni Domenico Di Girolamo & Vincenzo Gattulli & Fabio Graziosi & Alessandro D’Innocenzo, 2020. "Learning Models for Seismic-Induced Vibrations Optimal Control in Structures via Random Forests," Journal of Optimization Theory and Applications, Springer, vol. 187(3), pages 855-874, December.
    4. Zeydin Pala & Musa Sana, 2020. "Attackdet: Combining web data parsing and real-time analysis with machine learning," Journal of Advances in Technology and Engineering Research, A/Professor Akbar A. Khatibi, vol. 6(1), pages 37-45.
    5. Menor Dawn Bernadette Ortillo, 2019. "A configurable data management solution For Small-Medium Enterprises (SMEs)," Journal of Advances in Technology and Engineering Research, A/Professor Akbar A. Khatibi, vol. 5(3), pages 101-115.
    6. Salasiah Hanin Hamjah* & Izzah Nur Aida Zur Raffar & Rosmawati Mohamad Rasit & Zuliza Mohd Kusrin, 2019. "Adolescent’s Perception of Father’s Leadership Style in the Family," The Journal of Social Sciences Research, Academic Research Publishing Group, vol. 5(2), pages 284-290, 02-2019.
    7. Cherl Nino M. Locsin & Rosana J. Ferolin, 2018. "Neural networks application for water distribution demand-driven decision support system," Journal of Advances in Technology and Engineering Research, A/Professor Akbar A. Khatibi, vol. 4(4), pages 160-175.
    8. Yerkezhan Seitbekova & Bakhytzhan Assilbekov & Iskander Beisembetov & Alibek Kuljabekov, 2020. "The bus arrival time prediction using LSTM neural network and location analysis," Journal of Advances in Technology and Engineering Research, A/Professor Akbar A. Khatibi, vol. 6(2), pages 46-57.
    9. Jian-Da Wu & Yi-Cheng Luo & Hsien-Yu Lin, 2017. "Vehicle types classification using deep neural network techniques," Journal of Advances in Technology and Engineering Research, A/Professor Akbar A. Khatibi, vol. 3(6), pages 235-243.
    10. Isao Sasano & Kei Morisawa & Yutaka Hirakawa, 2019. "Personalized spoiler detection in tweets by using support vector machine," Journal of Advances in Technology and Engineering Research, A/Professor Akbar A. Khatibi, vol. 5(5), pages 219-226.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:apb:jaterr:2019:p:199-206. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: A/Professor Akbar A. Khatibi (email available below). General contact details of provider: https://tafpublications.com/platform/published_papers/10 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.