Forged Video Detection Using Deep Learning: A SLR

IF 2.4 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Maryam Munawar, Iram Noreen, Raed S. Alharthi, Nadeem Sarwar
{"title":"Forged Video Detection Using Deep Learning: A SLR","authors":"Maryam Munawar, Iram Noreen, Raed S. Alharthi, Nadeem Sarwar","doi":"10.1155/2023/6661192","DOIUrl":null,"url":null,"abstract":"In today’s digital landscape, video and image data have emerged as pivotal and widely adopted means of communication. They serve not only as a ubiquitous mode of conveying information but also as indispensable evidential and substantiating elements across diverse domains, encompassing law enforcement, forensic investigations, media, and numerous others. This study employs a systematic literature review (SLR) methodology to meticulously investigate the existing body of knowledge. An exhaustive review and analysis of precisely 90 primary research studies were conducted, unveiling a range of research methodologies instrumental in detecting forged videos. The study’s findings shed light on several research methodologies integral to the detection of forged videos, including deep neural networks, convolutional neural networks, Deepfake analysis, watermarking networks, and clustering, amongst others. This array of techniques highlights the field and emphasizes the need to combat the evolving challenges posed by forged video content. The study shows that videos are susceptible to an array of manipulations, with key issues including frame insertion, deletion, and duplication due to their dynamic nature. The main limitations of the domain are copy-move forgery, object-based forgery, and frame-based forgery. This study serves as a comprehensive repository of the latest advancements and techniques, structured, and summarized to benefit researchers and practitioners in the field. It elucidates the complex challenges inherent to video forensics.","PeriodicalId":44894,"journal":{"name":"Applied Computational Intelligence and Soft Computing","volume":"23 6","pages":"0"},"PeriodicalIF":2.4000,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Computational Intelligence and Soft Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1155/2023/6661192","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

In today’s digital landscape, video and image data have emerged as pivotal and widely adopted means of communication. They serve not only as a ubiquitous mode of conveying information but also as indispensable evidential and substantiating elements across diverse domains, encompassing law enforcement, forensic investigations, media, and numerous others. This study employs a systematic literature review (SLR) methodology to meticulously investigate the existing body of knowledge. An exhaustive review and analysis of precisely 90 primary research studies were conducted, unveiling a range of research methodologies instrumental in detecting forged videos. The study’s findings shed light on several research methodologies integral to the detection of forged videos, including deep neural networks, convolutional neural networks, Deepfake analysis, watermarking networks, and clustering, amongst others. This array of techniques highlights the field and emphasizes the need to combat the evolving challenges posed by forged video content. The study shows that videos are susceptible to an array of manipulations, with key issues including frame insertion, deletion, and duplication due to their dynamic nature. The main limitations of the domain are copy-move forgery, object-based forgery, and frame-based forgery. This study serves as a comprehensive repository of the latest advancements and techniques, structured, and summarized to benefit researchers and practitioners in the field. It elucidates the complex challenges inherent to video forensics.
使用深度学习的伪造视频检测:单反
在当今的数字环境中,视频和图像数据已成为关键和广泛采用的通信手段。它们不仅是一种无处不在的信息传递方式,而且在各个领域(包括执法、法医调查、媒体和许多其他领域)都是不可或缺的证据和证实要素。本研究采用系统文献回顾(SLR)的方法,细致地调查现有的知识体系。对90项主要研究进行了详尽的审查和分析,揭示了一系列用于检测伪造视频的研究方法。该研究的发现揭示了几种检测伪造视频不可或缺的研究方法,包括深度神经网络、卷积神经网络、Deepfake分析、水印网络和聚类等。这一系列技术突出了这一领域,并强调了与伪造视频内容带来的不断变化的挑战作斗争的必要性。研究表明,视频容易受到一系列操作的影响,由于其动态特性,关键问题包括帧插入、删除和重复。该领域的主要限制是复制-移动伪造、基于对象的伪造和基于帧的伪造。本研究作为最新进展和技术的综合存储库,进行结构化和总结,以使该领域的研究人员和从业人员受益。它阐明了视频取证所固有的复杂挑战。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Applied Computational Intelligence and Soft Computing
Applied Computational Intelligence and Soft Computing COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-
CiteScore
6.10
自引率
3.40%
发文量
59
审稿时长
21 weeks
期刊介绍: Applied Computational Intelligence and Soft Computing will focus on the disciplines of computer science, engineering, and mathematics. The scope of the journal includes developing applications related to all aspects of natural and social sciences by employing the technologies of computational intelligence and soft computing. The new applications of using computational intelligence and soft computing are still in development. Although computational intelligence and soft computing are established fields, the new applications of using computational intelligence and soft computing can be regarded as an emerging field, which is the focus of this journal.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信