{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T04:24:08Z","timestamp":1774844648674,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3582197.3582210","type":"proceedings-article","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T22:16:15Z","timestamp":1680214575000},"page":"80-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Video Inter-frame Tampering Detection Based on SN-VGG+BiLSTM-AE Composite Model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8508-9873","authenticated-orcid":false,"given":"Qi","family":"Xing","sequence":"first","affiliation":[{"name":"Beijing Institute of Computer Technology and Application, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9595-287X","authenticated-orcid":false,"given":"Yun","family":"Luo","sequence":"additional","affiliation":[{"name":"Beijing Institute of Computer Technology and Application, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7217-7348","authenticated-orcid":false,"given":"Zhaoyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Computer Technology and Application, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0816-3168","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Computer Technology and Application, China"}]}],"member":"320","published-online":{"date-parts":[[2023,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161375"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.07.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-020-00711-6"},{"key":"e_1_3_2_1_4_1","first-page":"257","volume-title":"International Workshop on Digital Watermarking","author":"Wang W.","year":"2013","unstructured":"W. Wang , X. Jiang , S. Wang , M. Wan , and T. Sun , \u201c Identifying video forgery process using optical flow ,\u201d in International Workshop on Digital Watermarking , 2013 , pp. 244\u2013 257 . W. Wang, X. Jiang, S. Wang, M. Wan, and T. Sun, \u201cIdentifying video forgery process using optical flow,\u201d in International Workshop on Digital Watermarking, 2013, pp. 244\u2013257."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854085"},{"issue":"5","key":"e_1_3_2_1_6_1","first-page":"493","article-title":"Digital video forgeries detection based on content continuity","volume":"47","author":"Huang T.","year":"2011","unstructured":"T. Huang , Z. Chen , L. Su , Z. Zheng , and X. Yuan , \u201c Digital video forgeries detection based on content continuity ,\u201d J. Nanjing Univ. Nat. Sci. , vol. 47 , no. 5 , pp. 493 \u2013 503 , 2011 . T. Huang, Z. Chen, L. Su, Z. Zheng, and X. Yuan, \u201cDigital video forgeries detection based on content continuity,\u201d J. Nanjing Univ. Nat. Sci., vol. 47, no. 5, pp. 493\u2013503, 2011.","journal-title":"J. Nanjing Univ. Nat. Sci."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-015-0478-1"},{"issue":"4","key":"e_1_3_2_1_8_1","first-page":"86","article-title":"Video-frame insertion and deletion detection based on consistency of quotients of MSSIM","volume":"38","author":"Z.","year":"2015","unstructured":"Z. Zhen-zhen, H. Jian-jun, L. Zhao-Hong , and G. Sheng , \u201c Video-frame insertion and deletion detection based on consistency of quotients of MSSIM ,\u201d J. Beijing Univ. Posts Telecommun. , vol. 38 , no. 4 , p. 86 , 2015 . Z. Zhen-zhen, H. Jian-jun, L. Zhao-Hong, and G. Sheng, \u201cVideo-frame insertion and deletion detection based on consistency of quotients of MSSIM,\u201d J. Beijing Univ. Posts Telecommun., vol. 38, no. 4, p. 86, 2015.","journal-title":"J. Beijing Univ. Posts Telecommun."},{"key":"e_1_3_2_1_9_1","first-page":"30","volume-title":"International workshop on digital watermarking","author":"Zheng L.","year":"2014","unstructured":"L. Zheng , T. Sun , and Y.-Q. Shi , \u201cInter-frame video forgery detection based on block-wise brightness variance descriptor ,\u201d in International workshop on digital watermarking , 2014 , pp. 18\u2013 30 . L. Zheng, T. Sun, and Y.-Q. Shi, \u201cInter-frame video forgery detection based on block-wise brightness variance descriptor,\u201d in International workshop on digital watermarking, 2014, pp. 18\u201330."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3424489"},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Multiple forgery detection in video using inter-frame correlation distance with dual-threshold","author":"Kumar V.","year":"2022","unstructured":"V. Kumar and M. Gaur , \u201c Multiple forgery detection in video using inter-frame correlation distance with dual-threshold ,\u201d Multimed. Tools Appl. , pp. 1 \u2013 20 , 2022 . V. Kumar and M. Gaur, \u201cMultiple forgery detection in video using inter-frame correlation distance with dual-threshold,\u201d Multimed. Tools Appl., pp. 1\u201320, 2022.","journal-title":"Multimed. Tools Appl."},{"key":"e_1_3_2_1_12_1","volume-title":"ArXiv Prepr. ArXiv14091556","author":"Simonyan K.","year":"2014","unstructured":"K. Simonyan and A. Zisserman , \u201c Very deep convolutional networks for large-scale image recognition ,\u201d ArXiv Prepr. ArXiv14091556 , 2014 . K. Simonyan and A. Zisserman, \u201cVery deep convolutional networks for large-scale image recognition,\u201d ArXiv Prepr. ArXiv14091556, 2014."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001493000339"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299064"},{"key":"e_1_3_2_1_15_1","first-page":"09586","article-title":"Understanding LSTM\u2013a tutorial into long short-term memory recurrent neural networks","author":"Staudemeyer R. C.","year":"1909","unstructured":"R. C. Staudemeyer and E. R. Morris , \u201c Understanding LSTM\u2013a tutorial into long short-term memory recurrent neural networks ,\u201d ArXiv Prepr. ArXiv 1909 09586 , 2019. R. C. Staudemeyer and E. R. Morris, \u201cUnderstanding LSTM\u2013a tutorial into long short-term memory recurrent neural networks,\u201d ArXiv Prepr. ArXiv190909586, 2019.","journal-title":"ArXiv Prepr. ArXiv"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005997"},{"key":"e_1_3_2_1_17_1","first-page":"852","volume-title":"International conference on machine learning","author":"Srivastava N.","year":"2015","unstructured":"N. Srivastava , E. Mansimov , and R. Salakhudinov , \u201c Unsupervised learning of video representations using lstms ,\u201d in International conference on machine learning , 2015 , pp. 843\u2013 852 . N. Srivastava, E. Mansimov, and R. Salakhudinov, \u201cUnsupervised learning of video representations using lstms,\u201d in International conference on machine learning, 2015, pp. 843\u2013852."},{"issue":"2","key":"e_1_3_2_1_18_1","first-page":"347","article-title":"Expansion of video forgery detection database and validation of its effectiveness","volume":"36","author":"Li J.","year":"2018","unstructured":"J. Li , \u201c Expansion of video forgery detection database and validation of its effectiveness ,\u201d J Appl Sci , vol. 36 , no. 2 , pp. 347 \u2013 361 , 2018 . J. Li , \u201cExpansion of video forgery detection database and validation of its effectiveness,\u201d J Appl Sci, vol. 36, no. 2, pp. 347\u2013361, 2018.","journal-title":"J Appl Sci"},{"key":"e_1_3_2_1_19_1","volume-title":"Xiph.org Video Test Media [derf's collection]","year":"2022","unstructured":"Xiph.org , \u201c Xiph.org Video Test Media [derf's collection] ,\u201d Nov. 10, 2022 . https:\/\/media.xiph.org\/video\/derf\/ Xiph.org, \u201cXiph.org Video Test Media [derf's collection],\u201d Nov. 10, 2022. https:\/\/media.xiph.org\/video\/derf\/"},{"key":"e_1_3_2_1_20_1","volume-title":"ArXiv Prepr. ArXiv14126980","author":"Kingma D. P.","year":"2014","unstructured":"D. P. Kingma and J. Ba , \u201c Adam: A method for stochastic optimization ,\u201d ArXiv Prepr. ArXiv14126980 , 2014 . D. P. Kingma and J. Ba, \u201cAdam: A method for stochastic optimization,\u201d ArXiv Prepr. ArXiv14126980, 2014."},{"key":"e_1_3_2_1_21_1","first-page":"281","volume-title":"International workshop on digital watermarking","author":"Chao J.","year":"2012","unstructured":"J. Chao , X. Jiang , and T. Sun , \u201c A novel video inter-frame forgery model detection scheme based on optical flow consistency ,\u201d in International workshop on digital watermarking , 2012 , pp. 267\u2013 281 . J. Chao, X. Jiang, and T. Sun, \u201cA novel video inter-frame forgery model detection scheme based on optical flow consistency,\u201d in International workshop on digital watermarking, 2012, pp. 267\u2013281."},{"key":"e_1_3_2_1_22_1","volume-title":"Research on video forgery passive detection based on spatial-temporal feature","author":"Tan M. Z.","year":"2012","unstructured":"M. Z. Tan , \u201c Research on video forgery passive detection based on spatial-temporal feature ,\u201d Shanghai Jiao Tong University , 2012 . M. Z. Tan, \u201cResearch on video forgery passive detection based on spatial-temporal feature,\u201d Shanghai Jiao Tong University, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"}],"event":{"name":"ICIT 2022: IoT and Smart City","location":"Shanghai China","acronym":"ICIT 2022"},"container-title":["Proceedings of the 2022 10th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582197.3582210","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3582197.3582210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:31Z","timestamp":1750182691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582197.3582210"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":23,"alternative-id":["10.1145\/3582197.3582210","10.1145\/3582197"],"URL":"https:\/\/doi.org\/10.1145\/3582197.3582210","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}