{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T06:49:00Z","timestamp":1768718940708,"version":"3.49.0"},"reference-count":30,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T00:00:00Z","timestamp":1617148800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2572018BH09"],"award-info":[{"award-number":["2572018BH09"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2572017PZ10"],"award-info":[{"award-number":["2572017PZ10"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["203822"],"award-info":[{"award-number":["203822"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002965","name":"Northeast Forestry University","doi-asserted-by":"publisher","award":["2572018BH09"],"award-info":[{"award-number":["2572018BH09"]}],"id":[{"id":"10.13039\/501100002965","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002965","name":"Northeast Forestry University","doi-asserted-by":"publisher","award":["2572017PZ10"],"award-info":[{"award-number":["2572017PZ10"]}],"id":[{"id":"10.13039\/501100002965","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002965","name":"Northeast Forestry University","doi-asserted-by":"publisher","award":["203822"],"award-info":[{"award-number":["203822"]}],"id":[{"id":"10.13039\/501100002965","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2021,3,31]]},"abstract":"<jats:p>In this digital era of technology and software development tools, low-cost digital cameras and powerful video editing software (such as Adobe Premiere, Microsoft Movie Maker, and Magix Vegas) have become available for any common user. Through these softwares, editing the contents of digital videos became very easy. Frame duplication is a common video forgery attack which can be done by copying and pasting a sequence of frames within the same video in order to hide or replicate some events from the video. Many algorithms have been proposed in the literature to detect such forgeries from the video sequences through analyzing the spatial and temporal correlations. However, most of them are suffering from low efficiency and accuracy rates and high computational complexity. In this paper, we are proposing an efficient and robust frame duplication detection algorithm to detect duplicated frames from the video sequence based on the improved Levenshtein distance. Extensive experiments were performed on some selected video sequences captured by stationary and moving cameras. In the experimental results, the proposed algorithm showed efficacy compared with the state-of-the-art techniques.<\/jats:p>","DOI":"10.1155\/2021\/5595850","type":"journal-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T20:35:41Z","timestamp":1617309341000},"page":"1-10","source":"Crossref","is-referenced-by-count":9,"title":["Frame Duplication Forgery Detection and Localization Algorithm Based on the Improved Levenshtein Distance"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5334-7636","authenticated-orcid":true,"given":"Honge","family":"Ren","sequence":"first","affiliation":[{"name":"College of Information and Computer Engineering, Northeast Forestry University, Harbin 150040, China"},{"name":"Heilongjiang Forestry Intelligent Equipment Engineering Research Center, Harbin 150040, China"}]},{"given":"Walid","family":"Atwa","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computers and Information, Menoufia University, Shebin El-Koom 32511, Egypt"}]},{"given":"Haosu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Heilongjiang Forestry Intelligent Equipment Engineering Research Center, Harbin 150040, China"}]},{"given":"Shafiq","family":"Muhammad","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advance Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1290-4272","authenticated-orcid":true,"given":"Mahmoud","family":"Emam","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511, Egypt"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.06.003"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2011.6028891"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.08.002"},{"key":"4","first-page":"244","article-title":"Identifying video forgery process using optical flow","author":"W. Wang"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.07.002"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2374-7"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2012.11.078"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2016.08.005"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2819624"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2013.05.027"},{"issue":"4","key":"11","first-page":"4632","article-title":"Handbook of image and video processing","volume":"62","author":"A. Bovik","year":"2005","journal-title":"Sensor Review"},{"key":"12","first-page":"35","article-title":"Exposing digital forgeries in video by detecting duplication","author":"W. Wang"},{"key":"13","first-page":"29","article-title":"Detection of frame duplication type of forgery in digital video using sub-block based features","author":"V. K. Singh"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1142\/s0218001412500176"},{"key":"15","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-642-41407-7_7","article-title":"Video copy-move forgery detection and localization based on structural similarity","volume-title":"Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)","author":"F. Li","year":"2014"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2003.819861"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2804768"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.01.005"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.07.076"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(80)90002-1"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/359038.359041"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/34.232078"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1999.0764"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002255"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.017"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101863"},{"key":"28","first-page":"326","article-title":"Detection of copy-scale-move forgery in digital images using SFOP and MROGH","author":"M. Emam"},{"key":"29","article-title":"A passive technique for detecting copy-move forgery with rotation based on polar complex exponential transform","author":"M. Emam"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016edl8024"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/5595850.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/5595850.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/5595850.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T20:35:45Z","timestamp":1617309345000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2021\/5595850\/"}},"subtitle":[],"editor":[{"given":"Sikandar","family":"Ali","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,3,31]]},"references-count":30,"alternative-id":["5595850","5595850"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5595850","relation":{},"ISSN":["1875-919X","1058-9244"],"issn-type":[{"value":"1875-919X","type":"electronic"},{"value":"1058-9244","type":"print"}],"subject":[],"published":{"date-parts":[[2021,3,31]]}}}