Robust Video Content Authentication using Video Binary Pattern and Extreme Learning Machine
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 8
Abstract
Recently, due to easy accessibility of smartphones, digital cameras and other video recording devices, a radical enhancement has been experienced in the field of digital video technology. Digital videos have become very vital in court of law and media (print, electronic and social). On the other hand, a widely-spread availability of Video Editing Tools (VETs) have made video tampering very easy. Detection of this tampering is very important, because it may affect the understanding and interpretation of video contents. Existing techniques used for detection of forgery in video contents can be broadly categorized into active and passive. In this research a passive technique for video tampering detection in spatial domain is proposed. The technique comprises of two phases: 1) Extraction of features with proposed Video Binary Pattern (VBP) descriptor, and 2) Extreme Learning Machine (ELM) based classification. Experimental results on different datasets reveal that the proposed technique achieved accuracy 98.47%.
Authors and Affiliations
Mubbashar Sadddique, Khurshid Asghar, Tariq Mehmood, Muhammad Hussain, Zulfiqar Habib
Secure Medical Internet of Things Framework based on Parkerian Hexad Model
Medical Internet of Things (MIoT) applications enhance medical services by collecting data using devices connected to the IoT. The collected data, which may include personal data and location, is transmitted to mobile de...
Implementation and Comparison of Text-Based Image Retrieval Schemes
Search engines, i.e., Google, Yahoo pro-vide various libraries and API’s to assist programmers and researchers in easier and efficient access to their collected data. When a user generates a search query, the dedicated A...
Towards Network-Aware Composition of Big Data Services in the Cloud
Several Big data services have been developed on the cloud to meet increasingly complex needs of users. Most times a single Big data service may not be capable in satisfying user requests. As a result, it has become nece...
A Knowledge-based Topic Modeling Approach for Automatic Topic Labeling
Probabilistic topic models, which aim to discover latent topics in text corpora define each document as a multinomial distributions over topics and each topic as a multinomial distributions over words. Although, humans c...
Area and Energy Efficient Viterbi Accelerator for Embedded Processor Datapaths
Viterbi algorithm is widely used in communication systems to efficiently decode the convolutional codes. This algorithm is used in many applications including cellular and satellite communication systems. Moreover, Seria...