{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,8]],"date-time":"2023-10-08T18:15:15Z","timestamp":1696788915245},"reference-count":9,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2023,10,1]]},"DOI":"10.1587\/transinf.2022edl8107","type":"journal-article","created":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T23:01:11Z","timestamp":1696114871000},"page":"1757-1760","source":"Crossref","is-referenced-by-count":0,"title":["Quantitative Estimation of Video Forgery with Anomaly Analysis of Optical Flow"],"prefix":"10.1587","volume":"E106.D","author":[{"given":"Wan Yeon","family":"LEE","sequence":"first","affiliation":[{"name":"Dongduk Women's University"}]},{"given":"Yun-Seok","family":"CHOI","sequence":"additional","affiliation":[{"name":"Dongduk Women's University"}]},{"given":"Tong Min","family":"KIM","sequence":"additional","affiliation":[{"name":"Catholic University of Korea"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] K. Sitara and B.M. Mehtre, \u201cDigital video tampering detection: An overview of passive techniques,\u201d Digital Investigation, vol.18, pp.8-22, June 2016. 10.1016\/j.diin.2016.06.003","DOI":"10.1016\/j.diin.2016.06.003"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] S. Kingra, N. Aggarwal, and R.D. Singh, \u201cInter-frame forgery detection in h.264 videos using motion and brightness gradients,\u201d Multimedia Tools and Applicatons, vol.76, no.24, pp.25767-25786, May 2017. 10.1007\/s11042-017-4762-2","DOI":"10.1007\/s11042-017-4762-2"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] R.D. Singh and N. Aggarwal, \u201cOptical flow and pattern noise-based copy-paste detection in digital videos,\u201d Multimedia Systems, vol.27, no.3, pp.449-469, June 2021. 10.1007\/s00530-020-00749-3","DOI":"10.1007\/s00530-020-00749-3"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] M. Kobayashi, T. Okabe, and Y. Sato, \u201cDetecting forgery from static-scene video based on inconsistency in noise level functions,\u201d IEEE Trans. Info. Forensics &amp; Security, vol.5, no.4, pp.883-892, Dec. 2010. 10.1109\/tifs.2010.2074194","DOI":"10.1109\/TIFS.2010.2074194"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] P. He, X. Jiang, T. Sun, and S. Wang, \u201cDetecting of double compression in MPEG-4 videos based on block artifact measurement,\u201d Neurocomputing, vol.228, pp.84-96, Dec. 2017. 10.1016\/j.neucom.2016.09.084","DOI":"10.1016\/j.neucom.2016.09.084"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] W. Bae, S.-H. Nam, I.-J. Yu, M.-J. Kwon, M. Yoon, and H.-K. Lee, \u201cDual-path convolutional neural network for classifying fine-grained manipulations in h.264 videos,\u201d Multimedia Tools and Applications, vol.80, no.7, pp.30879-30906, Aug. 2021. 10.1007\/s11042-021-10552-5","DOI":"10.1007\/s11042-021-10552-5"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] W.Y. Lee, \u201cPractical video authentication scheme to analyze software characteristics,\u201d IEICE Trans. Inf. &amp; Syst., vol.E104-D, no.1, pp.212-215, Jan. 2021. 10.1587\/transinf.2020EDL8081","DOI":"10.1587\/transinf.2020EDL8081"},{"key":"8","unstructured":"[8] J.K. Patel and C.B. Read, Handbook of the Normal Distribution, CRC Press, 1996."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] G. Qadir, S. Yahalya, and A.T.S. Ho, \u201cSurrey university library for forensic analysis (SULFA) of video content,\u201d IET Conf. Image Processing (IRP), July 2012. 10.1049\/cp.2012.0422","DOI":"10.1049\/cp.2012.0422"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E106.D\/10\/E106.D_2022EDL8107\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T04:22:32Z","timestamp":1696652552000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E106.D\/10\/E106.D_2022EDL8107\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,1]]},"references-count":9,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2022edl8107","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,1]]},"article-number":"2022EDL8107"}}