dc.contributor.author | Barhoom, Tawfiq | |
dc.contributor.author | Arabid, Mohammed | |
dc.date.accessioned | 2019-01-27T04:46:56Z | |
dc.date.available | 2019-01-27T04:46:56Z | |
dc.date.issued | 2018-05-01 | |
dc.identifier.uri | https://journal.uob.edu.bh:443/handle/123456789/3405 | |
dc.description.abstract | With the advancement of the digital video and digital image editing tools, this increases the difficulty for humans to identify visually the authentic video from the forged copy. This needs a powerful method that investigates various video from tempering attempts. There are several previous types of research, which propose methods for video forgery detection. These works suffer from consuming the memory and much-comparing power. The consequence is increasing the execution time. This research proposes a lightweight method; this means reduce memory usage and execution time for detecting forgery in video streams. The method based on using mathematical schema structure to explore various forgeries type on streaming videos. Experiments have been conducted on a dataset of 27 videos covering different cases using local IP camera, cases like using compression algorithms and some tempering effects. The result indicated that the system achieved high relevant measures with 97% accuracy on detecting duplication on a case of lossless compression and 95% on the other compression algorithms; on the other hand, on detecting cloning forgeries our system achieved a highly relevant measure with 86% on a case of lossless compression. | en_US |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Digital Tampering | en_US |
dc.subject | Digital Forensics | en_US |
dc.subject | Video Forgery | en_US |
dc.subject | Streaming attacks | en_US |
dc.subject | Digital Watermarking | en_US |
dc.subject | Streaming Security | en_US |
dc.title | Lightweight Digital Watermarking Method for Videos Forgeries Detection | en_US |
dc.identifier.doi | http://dx-doi.org/10.12785/ijcnt/060202 | |
dc.volume | Volume 6 | en_US |
dc.issue | Issue 2 | en_US |
dc.contributor.authorcountry | Palestine | en_US |
dc.contributor.authoraffiliation | Faculty of Information Technology Islamic University, Gaza, Palestine | en_US |
dc.source.title | International Journal of Computing and Network Technology | en_US |
dc.abbreviatedsourcetitle | IJCNT | en_US |
The following license files are associated with this item: