{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:25:33Z","timestamp":1768681533204,"version":"3.49.0"},"reference-count":93,"publisher":"Wiley","license":[{"start":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T00:00:00Z","timestamp":1698192000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2023,10,25]]},"abstract":"<jats:p>In today\u2019s digital landscape, video and image data have emerged as pivotal and widely adopted means of communication. They serve not only as a ubiquitous mode of conveying information but also as indispensable evidential and substantiating elements across diverse domains, encompassing law enforcement, forensic investigations, media, and numerous others. This study employs a systematic literature review (SLR) methodology to meticulously investigate the existing body of knowledge. An exhaustive review and analysis of precisely 90 primary research studies were conducted, unveiling a range of research methodologies instrumental in detecting forged videos. The study\u2019s findings shed light on several research methodologies integral to the detection of forged videos, including deep neural networks, convolutional neural networks, Deepfake analysis, watermarking networks, and clustering, amongst others. This array of techniques highlights the field and emphasizes the need to combat the evolving challenges posed by forged video content. The study shows that videos are susceptible to an array of manipulations, with key issues including frame insertion, deletion, and duplication due to their dynamic nature. The main limitations of the domain are copy-move forgery, object-based forgery, and frame-based forgery. This study serves as a comprehensive repository of the latest advancements and techniques, structured, and summarized to benefit researchers and practitioners in the field. It elucidates the complex challenges inherent to video forensics.<\/jats:p>","DOI":"10.1155\/2023\/6661192","type":"journal-article","created":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T15:35:11Z","timestamp":1698248111000},"page":"1-21","source":"Crossref","is-referenced-by-count":6,"title":["Forged Video Detection Using Deep Learning: A SLR"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9760-5374","authenticated-orcid":true,"given":"Maryam","family":"Munawar","sequence":"first","affiliation":[{"name":"Department of Computer Science, Bahria University Lahore Campus, Lahore 54782, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4683-4839","authenticated-orcid":true,"given":"Iram","family":"Noreen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Bahria University Lahore Campus, Lahore 54782, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6182-7923","authenticated-orcid":true,"given":"Raed S.","family":"Alharthi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Hafr Al-Batin, Hafar Al-Batin 39524, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8681-6382","authenticated-orcid":true,"given":"Nadeem","family":"Sarwar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Bahria University Lahore Campus, Lahore 54782, Pakistan"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-021-02347-4"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-022-01083-2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11448-0"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2022.116695"},{"key":"5","article-title":"Robust watermarking for video forgery detection with improved imperceptibility and robustness","author":"Y. Zhou","year":"2022"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.3390\/sym14020364"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2023.3281475"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.018854"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7030047"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11126-1"},{"key":"11","article-title":"Machine learning in digital forensics: a systematic literature review","author":"T. Nayerifard","year":"2023"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2023.2192888"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO56286.2022.9964871"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3154404"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.3390\/s22124556"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS45141.2019.9065881"},{"key":"18","first-page":"4129","article-title":"AltFreezing for more general video face forgery detection","author":"Z. Wang"},{"key":"19","doi-asserted-by":"crossref","DOI":"10.1109\/ICCV.2019.00009","article-title":"FaceForensics++: learning to detect manipulated facial images","author":"A. Rossler","year":"2019"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2023.3304913"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13284-2"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.0422"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2019.0397"},{"key":"25","article-title":"DDD17: end-to-end DAVIS driving dataset","author":"J. Binas","year":"2017"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413769"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1093\/ehjqcco\/qcy022"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/SIP.2015.9"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.archger.2019.103961"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2016.07.013"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2964308"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.116066"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01477"},{"key":"34","article-title":"The DeepFake detection challenge (DFDC) dataset","author":"B. Dolhansky","year":"2020"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488798"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/OJSP.2021.3074298"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07126-3"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.134"},{"issue":"207","key":"39","first-page":"207","article-title":"Video forgery detection using deep learning techniques and clustering algorithms","volume":"12","author":"R. Sasikumar","year":"2020","journal-title":"Studia Rosenthaliana"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2993004"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.5815\/ijigsp.2020.03.01"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI56018.2022.00105"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/s42044-019-00029-y"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922145"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2016.04.005"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08236-2"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-022-01719-2"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0268-z"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7165-8"},{"key":"50","first-page":"49","article-title":"CoMoFoD-new database for copy-move forgery detection","author":"D. Tralic"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7277-1"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08044-8"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2819624"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6585-1"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00352"},{"key":"57","first-page":"1","article-title":"The cityscapes dataset","author":"M. Cordts"},{"key":"58","article-title":"KITTI-CARLA: a KITTI-like dataset generated by CARLA Simulator","author":"J.-E. Deschaud","year":"2021"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00583"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"61","article-title":"Online action detection in untrimmed, streaming videos,\u201d eccv, arXiv prepr","author":"Z. Shou","year":"2018"},{"key":"62","first-page":"3628","article-title":"Turn tap: temporal unit regression network for temporal action proposals supplementary materials university of southern California","author":"J. Gao"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012411"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-017-0581-6"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5791-1"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1117\/12.2326806"},{"key":"68","first-page":"6299","article-title":"Quo vadis, action recognition","author":"J. Carreira"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2804768"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-330"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083247"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-040720-031848"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1703-125"},{"key":"74","volume-title":"Forensics Face Detection From Gans Using Convolutional Neural Network","author":"N. Do","year":"2018"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.237"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1145\/2812802"},{"key":"77","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2760098"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2017.085196"},{"key":"79","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.09.114"},{"key":"80","article-title":"NiI-Hitachi-Uit at TRECVID 2016","author":"D. D. Le","year":"2016"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2017.49"},{"issue":"1","key":"82","first-page":"13","article-title":"Frame duplication forgery detection using physical random","volume":"4","author":"Academia","year":"2016","journal-title":"Saba Journal of Information Technology And Networking (SJITN)"},{"key":"83","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.07.001"},{"key":"84","doi-asserted-by":"publisher","DOI":"10.1145\/3524273.3532889"},{"key":"85","doi-asserted-by":"publisher","DOI":"10.1109\/SSIAI.2016.7459197"},{"key":"86","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"87","first-page":"422","article-title":"Casia image tampering detection evaluation database","author":"T. T. Jing Dong"},{"key":"88","volume-title":"A Data Set of Authentic and Spliced Image Blocks","author":"T.-T. Ng","year":"2004"},{"key":"89","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.08.040"},{"key":"90","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019127"},{"key":"91","article-title":"Convolutional neural networks, explained","author":"P. A. Guti\u00e9rrez","year":"2020"},{"key":"92","article-title":"What\u2019s a deep neural network? Deep nets explained","author":"J. Johnson","year":"2020"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21498-1_23"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/6661192.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/6661192.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/6661192.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T09:57:17Z","timestamp":1698487037000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/acisc\/2023\/6661192\/"}},"subtitle":[],"editor":[{"given":"Mominul","family":"Ahsan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,10,25]]},"references-count":93,"alternative-id":["6661192","6661192"],"URL":"https:\/\/doi.org\/10.1155\/2023\/6661192","relation":{},"ISSN":["1687-9732","1687-9724"],"issn-type":[{"value":"1687-9732","type":"electronic"},{"value":"1687-9724","type":"print"}],"subject":[],"published":{"date-parts":[[2023,10,25]]}}}