{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T14:30:00Z","timestamp":1770820200767,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030051709","type":"print"},{"value":"9783030051716","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_16","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:52:06Z","timestamp":1544007126000},"page":"304-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A Digital Forensic Technique for Inter\u2013Frame Video Forgery Detection Based on 3D CNN"],"prefix":"10.1007","author":[{"given":"Jamimamul","family":"Bakas","sequence":"first","affiliation":[]},{"given":"Ruchira","family":"Naskar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.neucom.2016.03.051","volume":"205","author":"L Yu","year":"2016","unstructured":"Yu, L., et al.: Exposing frame deletion by detecting abrupt changes in video streams. Neurocomputing 205, 84\u201391 (2016)","journal-title":"Neurocomputing"},{"issue":"4","key":"16_CR2","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.diin.2013.10.004","volume":"10","author":"T Shanableh","year":"2013","unstructured":"Shanableh, T.: Detection of frame deletion for digital video forensics. Digit. Investig. 10(4), 350\u2013360 (2013). \nhttps:\/\/doi.org\/10.1016\/j.diin.2013.10.004","journal-title":"Digit. Investig."},{"key":"16_CR3","doi-asserted-by":"publisher","unstructured":"Su, Y., Zhang, J., Liu, J.: Exposing digital video forgery by detecting motion-compensated edge artifact. In: International Conference on Computational Intelligence and Software Engineering, pp. 1\u20134, December 2009. \nhttps:\/\/doi.org\/10.1109\/CISE.2009.5366884","DOI":"10.1109\/CISE.2009.5366884"},{"key":"16_CR4","first-page":"289","volume":"47","author":"JA Aghamaleki","year":"2016","unstructured":"Aghamaleki, J.A., Behrad, A.: Inter-frame video forgery detection and localization using intrinsic effects of double compression on quantization errors of video coding. Sig. Process.: Image Commun. 47, 289\u2013302 (2016)","journal-title":"Sig. Process.: Image Commun."},{"issue":"2","key":"16_CR5","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1002\/sec.981","volume":"8","author":"Z Zhang","year":"2015","unstructured":"Zhang, Z., Hou, J., Ma, Q., Li, Z.: Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames. Secur. Commun. Netw. 8(2), 311\u2013320 (2015)","journal-title":"Secur. Commun. Netw."},{"issue":"17","key":"16_CR6","doi-asserted-by":"crossref","first-page":"4548","DOI":"10.1002\/sec.1648","volume":"9","author":"Z Li","year":"2016","unstructured":"Li, Z., Zhang, Z., Guo, S., Wang, J.: Video inter-frame forgery identification based on the consistency of quotient of MSSIM. Secur. Commun. Netw. 9(17), 4548\u20134556 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"16_CR7","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s00530-015-0478-1","volume":"23","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Huang, T.: Exposing video inter-frame forgery by Zernike opponent chromaticity moments and coarseness analysis. Multimed. Syst. 23(2), 223\u2013238 (2017)","journal-title":"Multimed. Syst."},{"issue":"Supplement C","key":"16_CR8","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.diin.2016.06.003","volume":"18","author":"K Sitara","year":"2016","unstructured":"Sitara, K., Mehtre, B.: Digital video tampering detection: an overview of passive techniques. Digit. Investig. 18(Supplement C), 8\u201322 (2016). \nhttps:\/\/doi.org\/10.1016\/j.diin.2016.06.003","journal-title":"Digit. Investig."},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-018-6570-8","volume":"2018","author":"J Bakas","year":"2018","unstructured":"Bakas, J., Naskar, R., Dixit, R.: Detection and localization of inter-frame video forgeries based on inconsistency in correlation distribution between Haralick coded frames. Multimed. Tools Appl. 2018, 1\u201331 (2018). \nhttps:\/\/doi.org\/10.1007\/s11042-018-6570-8","journal-title":"Multimed. Tools Appl."},{"key":"16_CR10","unstructured":"Sermanet, P., Eigen, D., Zhang, X., Mathieu, M., Fergus, R., LeCun, Y.: Overfeat: integrated recognition, localization and detection using convolutional networks. arXiv preprint \narXiv:1312.6229\n\n (2013)"},{"key":"16_CR11","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint \narXiv:1409.1556\n\n (2014)"},{"key":"16_CR12","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097\u20131105 (2012)"},{"key":"16_CR13","unstructured":"Simonyan, K., Vedaldi, A., Zisserman, A.: Deep inside convolutional networks: visualising image classification models and saliency maps. arXiv preprint \narXiv:1312.6034\n\n (2013)"},{"issue":"1","key":"16_CR14","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TPAMI.2012.59","volume":"35","author":"S Ji","year":"2013","unstructured":"Ji, S., Xu, W., Yang, M., Yu, K.: 3D convolutional neural networks for human action recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(1), 221\u2013231 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"16_CR15","unstructured":"Simonyan, K., Zisserman, A.: Two-stream convolutional networks for action recognition in videos. In: Advances in Neural Information Processing Systems, pp. 568\u2013576 (2014)"},{"key":"16_CR16","doi-asserted-by":"publisher","unstructured":"Long, C., Smith, E., Basharat, A., Hoogs, A.: A C3D-based convolutional neural network for frame dropping detection in a single video shot. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1898\u20131906, July 2017. \nhttps:\/\/doi.org\/10.1109\/CVPRW.2017.237","DOI":"10.1109\/CVPRW.2017.237"},{"key":"16_CR17","doi-asserted-by":"publisher","unstructured":"Tran, D., Bourdev, L., Fergus, R., Torresani, L., Paluri, M.: Learning spatiotemporal features with 3D convolutional networks. In: Proceedings of the IEEE International Conference on Computer Vision, ICCV 2015, pp. 4489\u20134497. IEEE Computer Society, Washington (2015). \nhttps:\/\/doi.org\/10.1109\/ICCV.2015.510","DOI":"10.1109\/ICCV.2015.510"},{"key":"16_CR18","doi-asserted-by":"publisher","unstructured":"Wu, Y., Jiang, X., Sun, T., Wang, W.: Exposing video inter-frame forgery based on velocity field consistency. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2674\u20132678, May 2014. \nhttps:\/\/doi.org\/10.1109\/ICASSP.2014.6854085","DOI":"10.1109\/ICASSP.2014.6854085"},{"issue":"04","key":"16_CR19","doi-asserted-by":"crossref","first-page":"51","DOI":"10.4236\/jcc.2014.24008","volume":"2","author":"Q Wang","year":"2014","unstructured":"Wang, Q., Li, Z., Zhang, Z., Ma, Q.: Video inter-frame forgery identification based on consistency of correlation coefficients of gray values. J. Comput. Commun. 2(04), 51 (2014)","journal-title":"J. Comput. Commun."},{"key":"16_CR20","doi-asserted-by":"publisher","unstructured":"Su, Y., Nie, W., Zhang, C.: A frame tampering detection algorithm for MPEG videos. In: 6th IEEE Joint International Information Technology and Artificial Intelligence Conference, vol. 2, pp. 461\u2013464 (2011). \nhttps:\/\/doi.org\/10.1109\/ITAIC.2011.6030373","DOI":"10.1109\/ITAIC.2011.6030373"},{"issue":"7","key":"16_CR21","doi-asserted-by":"crossref","first-page":"92","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-330","volume":"2017","author":"D D\u2019Avino","year":"2017","unstructured":"D\u2019Avino, D., Cozzolino, D., Poggi, G., Verdoliva, L.: Autoencoder with recurrent neural networks for video forgery detection. Electron. Imaging 2017(7), 92\u201399 (2017)","journal-title":"Electron. Imaging"},{"key":"16_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-016-4205-5","volume":"77","author":"DN Zhao","year":"2018","unstructured":"Zhao, D.N., Wang, R.K., Lu, Z.M.: Inter-frame passive-blind forgery detection for video shot based on similarity analysis. Multimed. Tools Appl. 77, 1\u201320 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"16_CR23","unstructured":"Hall, G.: Pearson\u2019s correlation coefficient. Other Words 1(9) (2015). \nhttp:\/\/www.hep.ph.ic.ac.uk\/~hallg\/UG_2015\/Pearsons.pdf\n\n. Accessed 3 Oct 2018"},{"issue":"20","key":"16_CR24","doi-asserted-by":"crossref","first-page":"20691","DOI":"10.1007\/s11042-016-4004-z","volume":"76","author":"JA Aghamaleki","year":"2017","unstructured":"Aghamaleki, J.A., Behrad, A.: Malicious inter-frame video tampering detection in mpeg videos using time and spatial domain analysis of quantization effects. Multimed. Tools Appl. 76(20), 20691\u201320717 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"24","key":"16_CR25","doi-asserted-by":"crossref","first-page":"25767","DOI":"10.1007\/s11042-017-4762-2","volume":"76","author":"S Kingra","year":"2017","unstructured":"Kingra, S., Aggarwal, N., Singh, R.D.: Inter-frame forgery detection in H. 264 videos using motion and brightness gradients. Multimed. Tools Appl. 76(24), 25767\u201325786 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"11","key":"16_CR26","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Sig. Process. Lett. 22(11), 1849\u20131853 (2015)","journal-title":"IEEE Sig. Process. Lett."},{"key":"16_CR27","unstructured":"Walia, A.S.: Activation functions and it\u2019s types-which is better? (2017). \nhttps:\/\/towardsdatascience.com\/activation-functions-and-its-types-which-is-better-a9a5310cc8f\n\n. Accessed 13 Aug 2018"},{"issue":"1","key":"16_CR28","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"16_CR29","unstructured":"Kingma, D.P., Ba, L.: J., : ADAM: a method for stochastic optimization. In: Learning Representations (2015)"},{"key":"16_CR30","unstructured":"Soomro, K., Zamir, A.R., Shah, M.: UCF101: a dataset of 101 human actions classes from videos in the wild. arXiv preprint \narXiv:1212.0402\n\n (2012)"},{"key":"16_CR31","unstructured":"Developers, F.: FFmpeg tool (Version 3.2.4) [Software] (2017). \nhttps:\/\/www.ffmpeg.org"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T11:01:23Z","timestamp":1544007683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}