Robust Video Content Authentication using Video Binary Pattern and Extreme Learning Machine
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 8
Abstract
Recently, due to easy accessibility of smartphones, digital cameras and other video recording devices, a radical enhancement has been experienced in the field of digital video technology. Digital videos have become very vital in court of law and media (print, electronic and social). On the other hand, a widely-spread availability of Video Editing Tools (VETs) have made video tampering very easy. Detection of this tampering is very important, because it may affect the understanding and interpretation of video contents. Existing techniques used for detection of forgery in video contents can be broadly categorized into active and passive. In this research a passive technique for video tampering detection in spatial domain is proposed. The technique comprises of two phases: 1) Extraction of features with proposed Video Binary Pattern (VBP) descriptor, and 2) Extreme Learning Machine (ELM) based classification. Experimental results on different datasets reveal that the proposed technique achieved accuracy 98.47%.
Authors and Affiliations
Mubbashar Sadddique, Khurshid Asghar, Tariq Mehmood, Muhammad Hussain, Zulfiqar Habib
Self-regulating Message Throughput in Enterprise Messaging Servers – A Feedback Control Solution
Enterprise Messaging is a very popular message exchange concept in asynchronous distributed computing environments. The Enterprise Messaging Servers are heavily used in building business critical Enterprise applic...
An Efficient Spectral Amplitude Coding (SAC) Technique for Optical CDMA System using Wavelength Division Multiplexing (WDM) Concepts
This article introduces an improved method for Optical Code Division Multiple Access system (OCDMA). In this scheme, a hybrid technique is used in which Wavelength Division Multiplexing (WDM) is merged with Spectral Ampl...
Human Face Detection under Complex Lighting Conditions
This paper presents a novel method for detecting human faces in an image with complex backgrounds. The approach is based on visual information of the face from the template image and is commenced with the estimatio...
A Penalized-Likelihood Image Reconstruction Algorithm for Positron Emission Tomography Exploiting Root Image Size
Iterative image reconstruction methods are considered better as compared to the analytical reconstruction methods in terms of their noise characteristics and quantification ability. Penalized-Likelihood Expectation Maxim...
Cloud Computing Adoption in Small and Medium- Sized Enterprises (SMEs) of Asia and Africa
Cloud computing is a rapidly emerging technology over the last few years that has abolished the burden of purchasing heavy hardware and licensed software. Cloud computing has been advantageous to Small and Medium-sized E...