{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:01:11Z","timestamp":1764831671855,"version":"3.46.0"},"reference-count":103,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.069129","type":"journal-article","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T07:59:53Z","timestamp":1757318393000},"page":"2487-2526","source":"Crossref","is-referenced-by-count":0,"title":["A Comprehensive Review on File Containers-Based Image and Video Forensics"],"prefix":"10.32604","volume":"85","author":[{"given":"Pengpeng","family":"Yang","sequence":"first","affiliation":[]},{"given":"Chen","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Dasara","family":"Shullani","sequence":"additional","affiliation":[]},{"given":"Lanxi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Baracchi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"Reinsel D, Gantz J, Rydning J. The digitization of the world: from edge to core. IDC White Paper; 2018. [cited 2025 Aug 12]. Available from: https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-seagate-dataage-whitepaper.pdf."},{"key":"ref2","unstructured":"Systems C. Cisco Annual Internet Report (2018\u20132023); 2023. [cited 2023 Oct 1]. Available from: https:\/\/www.cisco.com\/c\/en\/us\/solutions\/executive-perspectives\/annual-internet-report\/index.html."},{"key":"ref3","unstructured":"Department SR. Number of Social Media Users Worldwide from 2017 to 2027; 2023. [cited 2023 Oct 1]. Available from: https:\/\/www.statista.com\/statistics\/278414\/number-of-worldwide-social-network-users\/."},{"key":"ref4","unstructured":"Corp P. Video Marketing in 2024: trends and Statistics You Can\u2019t Afford to Ignore; 2024. [cited 2025 Aug 12]. Available from: https:\/\/personifycorp.com\/blog\/video-marketing-in-2024-trends-and-statistics-you-cant-afford-to-ignore\/."},{"key":"ref5","unstructured":"DataReportal. Digital Around the World\u2014DataReportal\u2013Global Digital Insights; 2025. [cited 2025 Aug 12]. Available from: https:\/\/datareportal.com\/global-digital-overview."},{"key":"ref6","first-page":"289","article-title":"Overview of deepfake video detection technology","volume":"47","author":"Bao","year":"2020","journal-title":"Comput Sci"},{"key":"ref7","first-page":"2338","article-title":"An overviw of Deepfake forgery and defense techniques","volume":"37","author":"Zhou","year":"2021","journal-title":"J Signal Process"},{"key":"ref8","first-page":"0043","article-title":"An overview of visual DeepFake detection techniques","volume":"27","author":"Wang","year":"2022","journal-title":"J Image Graph"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.neucom.2022.09.135","article-title":"A comprehensive overview of Deepfake: generation, detection, datasets, and opportunities","volume":"513","author":"Seow","year":"2022","journal-title":"Neurocomputing"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"124260","DOI":"10.1016\/j.eswa.2024.124260","article-title":"Unmasking deepfakes: a systematic review of deepfake detection and generation techniques using artificial intelligence","volume":"252","author":"Abbas","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref11","first-page":"1","article-title":"Deepfake detection: a comprehensive survey from the reliability perspective","volume":"57","author":"Wang","year":"2024","journal-title":"ACM Comput Surv"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"73","DOI":"10.3390\/jimaging11030073","article-title":"Deepfake media forensics: status and future challenges","volume":"11","author":"Amerini","year":"2025","journal-title":"J Imaging"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"69","DOI":"10.3390\/jimaging7040069","article-title":"A comprehensive review of deep-learning-based methods for image forensics","volume":"7","author":"Castillo Camacho","year":"2021","journal-title":"J Imaging"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"25464","DOI":"10.1109\/ACCESS.2022.3154059","article-title":"Research trends, challenges, and emerging topics in digital forensics: a review of reviews","volume":"10","author":"Casino","year":"2022","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.11834\/jig.210081","article-title":"Overview of digital media forensics technology","volume":"26","author":"Li","year":"2021","journal-title":"J Image Graph"},{"key":"ref16","first-page":"2440","article-title":"Overview of multimedia cognition security","volume":"37","author":"Zhou","year":"2021","journal-title":"J Signal Process"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1629","DOI":"10.1007\/s10462-021-10046-8","article-title":"Passive image forensics using universal techniques: a review","volume":"55","author":"Gupta","year":"2022","journal-title":"Artif Intell Rev"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1007\/s00530-021-00873-8","article-title":"A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions","volume":"28","author":"Nabi","year":"2022","journal-title":"Multime Syst"},{"key":"ref19","series-title":"2022 IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR)","first-page":"324","article-title":"An overview of recent work in multimedia forensics","author":"Bhagtani","year":"2022 Aug 2\u20134"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1007\/s10462-022-10211-7","article-title":"Image forgery techniques: a review","volume":"56","author":"Kaur","year":"2023","journal-title":"Artif Intell Rev"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"101241","DOI":"10.1109\/ACCESS.2023.3312181","article-title":"ENF based digital multimedia forensics: survey, application, challenges and future work","volume":"11","author":"Ngharamike","year":"2023","journal-title":"IEEE Access"},{"key":"ref22","unstructured":"Nayerifard T, Amintoosi H, Bafghi AG, Dehghantanha A. Machine learning in digital forensics: a systematic literature review. arXiv:2306.04965. 2023. doi:10.48550\/arxiv.2306.04965."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","article-title":"Media forensics and deepfakes: an overview","volume":"14","author":"Verdoliva","year":"2020","journal-title":"IEEE J Select Topics Signal Process"},{"key":"ref24","first-page":"496701","article-title":"An overview on image forensics","volume":"2013","author":"Piva","year":"2013","journal-title":"Int Sch Res Notices"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"9","DOI":"10.3390\/jimaging6030009","article-title":"A survey of deep learning-based source image forensics","volume":"6","author":"Yang","year":"2020","journal-title":"J Imaging"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"3027","DOI":"10.3390\/s25103027","article-title":"Algorithms and methods for individual source camera identification: a survey","volume":"25","author":"Bernacki","year":"2025","journal-title":"Sensors"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1186\/s13635-021-00117-2","article-title":"Media forensics on social media platforms: a survey","volume":"2021","author":"Pasquini","year":"2021","journal-title":"EURASIP J Inf Secur"},{"key":"ref28","first-page":"301390","article-title":"Digital forensic analysis for source video identification: a survey","volume":"41","author":"Akbari","year":"2022","journal-title":"Foren Sci Int Dig Investigat"},{"key":"ref29","unstructured":"ITU-T T. Digital Compression and Coding of Continuous-tone Still Images-Part 1: requirements and guidelines. Recommendation; 1993. [cited 2025 Aug 12]. Available from: https:\/\/www.itu.int\/rec\/T-REC-T.81\/en."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/103085.103089","article-title":"The JPEG still picture compression standard","volume":"34","author":"Wallace","year":"1991","journal-title":"Communicat ACM"},{"journal-title":"Tokyo, Japan: Standard of Japan Electronics and Information Technology Industries Assocaition","article-title":"Exchangeable image file format for digital still cameras: Exif Version 2.2","year":"2002","key":"ref31"},{"key":"ref32","unstructured":"Commission IE et al. Information technology: digital compression and coding of continuous-tone still images 2009. [cited 2025 Aug 12]. Available from: http:\/\/www.dspace.cam.ac.uk\/handle\/1810\/219520."},{"key":"ref33","series-title":"2018 International Conference on Recent Trends in Advance Computing (ICRTAC);2018 Sep 10\u201311","first-page":"34","article-title":"Jpeg metadata: a complete study","author":"Fernandez","year":"2018"},{"key":"ref34","first-page":"1","article-title":"Using extended file information (EXIF) file headers in digital evidence analysis","volume":"2","author":"Alvarez","year":"2004","journal-title":"Intl J Dig Evid"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"335","DOI":"10.32628\/CSEIT183815","article-title":"Authentication of digital image using exif metadata and decoding properties","volume":"3","author":"Gangwar","year":"2018","journal-title":"Int J Scient Res Comput Sci Eng Inform Technol (IJSR CSEIT)"},{"key":"ref36","series-title":"2012 IEEE international workshop on information forensics and security (WIFS); 2012 Dec 2\u20135","first-page":"139","article-title":"Forensic analysis of ordered data structures on the example of JPEG files","author":"Gloe","year":"2012"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"S21","DOI":"10.1016\/j.diin.2008.05.004","article-title":"Using JPEG quantization tables to identify imagery processed by software","volume":"5","author":"Kornblum","year":"2008","journal-title":"Digit Invest"},{"key":"ref38","unstructured":"Farid H. Digital Image Ballistics from JPEG Quantization; 2006. [cited 2025 Aug 12]. Available from: https:\/\/api.semanticscholar.org\/CorpusID:116752184."},{"key":"ref39","unstructured":"Farid H. Digital image ballistics from JPEG quantization: a followup study; 2008. [cited 2025 Aug 12]. Available from: https:\/\/digitalcommons.dartmouth.edu\/cgi\/viewcontent.cgi?article=1322&context=cs_tr."},{"key":"ref40","first-page":"139","volume":"7541","author":"Kee","year":"2010","journal-title":"Media forensics and security II"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1109\/TIFS.2011.2128309","article-title":"Digital image authentication from JPEG headers","volume":"6","author":"Kee","year":"2011","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"S68","DOI":"10.1016\/j.diin.2019.01.016","article-title":"Forensic source identification using JPEG image headers: the case of smartphones","volume":"28","author":"Mullan","year":"2019","journal-title":"Digit Invest"},{"key":"ref43","first-page":"300916","article-title":"Towards open-set forensic source grouping on JPEG header information","volume":"32","author":"Mullan","year":"2020","journal-title":"Foren Sci Int Digital Investigat"},{"key":"ref44","series-title":"Image Analysis and Processing-ICIAP 2017: 19th International Conference","first-page":"625","article-title":"A classification engine for image ballistics of social data","author":"Giudice","year":"2017 Sep 11\u201315"},{"key":"ref45","series-title":"2018 IEEE 20th International Workshop on Multimedia Signal Processing (MMSP); 2018 Aug 29\u201331","first-page":"1","article-title":"Identifying image provenance: an analysis of mobile instant messaging apps","author":"Phan","year":"2018"},{"key":"ref46","series-title":"ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); 2019 May 12\u201317","first-page":"8266","article-title":"Tracking multiple image sharing on social networks","author":"Phan","year":"2019"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"9491","DOI":"10.1109\/TMM.2023.3253389","article-title":"Multi-clue reconstruction of sharing chains for social media images","volume":"25","author":"Verde","year":"2023","journal-title":"IEEE Transact Multim"},{"key":"ref48","series-title":"ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); 2023 Jun 4\u201310","first-page":"1","article-title":"Image sharing chain detection via sequence-to-sequence model","author":"You","year":"2023"},{"key":"ref49","series-title":"Proceedings of ICETIT 2019: Emerging Trends in Information Technology","first-page":"1071","article-title":"Identifying forged images using image metadata","author":"Bedi","year":"2020"},{"key":"ref50","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"6945","article-title":"Exif as language: learning cross-modal associations between images and camera metadata","author":"Zheng","year":"2023 Jun 17\u201324"},{"key":"ref51","series-title":"International Conference on Trends in Electronics and Health Informatics","first-page":"655","article-title":"Enhancing image forensics with transformer: a multi-head attention approach for robust metadata analysis","author":"Appel Mahmud Pranto","year":"2023"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3645094","article-title":"Exif2Vec: a framework to ascertain untrustworthy crowdsourced images using metadata","volume":"18","author":"Umair","year":"2024","journal-title":"ACM Transact Web"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach Learn"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","article-title":"Extremely randomized trees","volume":"63","author":"Geurts","year":"2006","journal-title":"Mach Learn"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1023\/A:1022643204877","article-title":"Induction of decision trees","volume":"1","author":"Quinlan","year":"1986","journal-title":"Mach Learn"},{"key":"ref56","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"101","article-title":"Fighting fake news: image splice detection via learned self-consistency","author":"Huh","year":"2018"},{"key":"ref57","series-title":"Innovations in Computer Science and Engineering: Proceedings of the Ninth ICICSE, 2021","first-page":"579","article-title":"Image forgery detection using metadata analysis and ELA processor","author":"Vadrevu","year":"2022"},{"key":"ref58","series-title":"2011 18th IEEE International Conference on Image Processing; 2011 Sep 11\u201314","first-page":"1945","article-title":"Modeling the EXIF-image correlation for image manipulation detection","author":"Fan"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1109\/TIFS.2013.2249064","article-title":"Estimating EXIF parameters based on noise features for image manipulation detection","volume":"8","author":"Fan","year":"2013","journal-title":"IEEE Transact Informa Foren Secur"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.1007\/s11424-015-4023-2","article-title":"The detecting system of image forgeries with noise features and EXIF information","volume":"28","author":"Sun","year":"2015","journal-title":"J Syst Sci Complex"},{"key":"ref61","unstructured":"Microsoft. AVI RIFF File Reference; 2024. EB\/OL. [cited 2025 Aug 12]. Available from: https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/directshow\/avi-riff-file-reference."},{"key":"ref62","unstructured":"ISO. ISO\/IEC 14496-12: 2020-Information technology\u2014Coding of audio-visual objects\u2014Part 12: ISO base media file format; 2024. EB\/OL. [cited 2025 Aug 12]. Available from: https:\/\/www.iso.org\/standard\/74428.html."},{"key":"ref63","unstructured":"Apple. QuickTime File Format Specification; 2024. EB\/OL. [cited 2025 Aug 12]. Available from: https:\/\/developer.apple.com\/documentation\/quicktime-file-format."},{"key":"ref64","unstructured":"ISO. ISO\/IEC 14496-14: 2020-Information technology\u2014Coding of audio-visual objects\u2014Part 14: MP4 file format; 2024. EB\/OL. [cited 2025 Aug 12]. Available from: https:\/\/www.iso.org\/standard\/79110.html."},{"key":"ref65","unstructured":"ISO. International Organization for Standardization, 3GP file format; 2024. EB\/OL. [cited 2025 Aug 12]. Available from: https:\/\/www.iso.org\/standard\/83102.html."},{"key":"ref66","doi-asserted-by":"crossref","first-page":"S68","DOI":"10.1016\/j.diin.2014.03.009","article-title":"Forensic analysis of video file formats","volume":"11","author":"Gloe","year":"2014","journal-title":"Digit Invest"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.diin.2016.06.001","article-title":"Integrity verification of the ordered data structures in manipulated video content","volume":"18","author":"Song","year":"2016","journal-title":"Dig Investigat"},{"key":"ref68","series-title":"2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","first-page":"436","article-title":"Methods for graphic visualization of video file structure and determining the origin in forensics","author":"Rudnikovich","year":"2019 Oct 21\u201327"},{"key":"ref69","unstructured":"G\u00fcera D, Baireddy S, Bestagini P, Tubaro S, Delp EJ. We need no pixels: video manipulation detection using stream descriptors. arXiv:1906.08743. 2019. doi:10.48550\/arxiv.1906.08743."},{"key":"ref70","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1109\/TIFS.2018.2859760","article-title":"A video forensic framework for the unsupervised analysis of MP4-like file container","volume":"14","author":"Iuliani","year":"2018","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.future.2020.02.044","article-title":"Authentication and integrity of smartphone videos through multimedia container structure analysis","volume":"108","author":"Huam\u00e1n","year":"2020","journal-title":"Future Generat Comput Syst"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1109\/JSTSP.2020.3008088","article-title":"Efficient video integrity analysis through container characterization","volume":"14","author":"Yang","year":"2020","journal-title":"IEEE J Select Top Signal Process"},{"key":"ref73","first-page":"1","article-title":"Video source identification from mp4 data based on field values in atom\/box attributes","volume":"33","author":"Gelbing","year":"2021","journal-title":"Elect Imag"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"36363","DOI":"10.1109\/ACCESS.2020.2971785","article-title":"Digital video source identification based on container\u2019s structure analysis","volume":"8","author":"L\u00f3pez","year":"2020","journal-title":"IEEE Access"},{"key":"ref75","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2021 Jun 19\u201325","first-page":"1042","article-title":"Forensic analysis of video files using metadata","author":"Xiang"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.future.2020.04.041","article-title":"A machine learning forensics technique to detect post-processing in digital videos","volume":"111","author":"Orozco","year":"2020","journal-title":"Fut Generat Comput Syst"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"3211","DOI":"10.1109\/TIFS.2022.3204210","article-title":"Video source characterization using encoding and encapsulation characteristics","volume":"17","author":"Altinisik","year":"2022","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref78","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"963","article-title":"MTN: forensic analysis of MP4 video files using graph neural networks","author":"Xiang","year":"2023 Jun 17\u201324"},{"key":"ref79","series-title":"ICASSP 2025-2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); 2025 Apr 6\u201311","first-page":"1","article-title":"ForensiCam-215K: a large scale image and video dataset for forensic analysis","author":"Du"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1186\/s13635-017-0067-2","article-title":"Vision: a video and image dataset for source identification","volume":"2017","author":"Shullani","year":"2017","journal-title":"EURASIP J Inf Secur"},{"key":"ref81","series-title":"Proceedings of the 6th ACM Multimedia Systems Conference","first-page":"219","article-title":"Raise: a raw images dataset for digital image forensics","author":"Dang-Nguyen","year":"2015"},{"key":"ref82","article-title":"A data set of authentic and spliced image blocks","author":"Ng","year":"2004","journal-title":"ADVENT technical report"},{"key":"ref83","unstructured":"CalPhotos. A database of photos of plants, animals, habitats and other natural history subjects; 2000. [cited 2025 Aug 12]. Available from: https:\/\/calphotos.berkeley.edu\/."},{"key":"ref84","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TIFS.2013.2265677","article-title":"Exposing digital image forgeries by illumination color classification","volume":"8","author":"de Carvalho","year":"2013","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1109\/TIFS.2016.2636089","article-title":"Multi-scale analysis strategies in PRNU-based tampering localization","volume":"12","author":"Korus","year":"2016","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref86","unstructured":"Kaggle. Real versus Fake\u2014Turkey Earthquake; 2023. [cited 2023 Aug 21]. Available from: https:\/\/www.kaggle.com\/datasets\/merveakdogan\/real-vs-fake-turkey-earthquake?rv=1."},{"key":"ref87","unstructured":"Kaggle. Mango Pests; 2023. [cited 2023 Aug 21]. Available from: https:\/\/www.kaggle.com\/datasets\/muhammadarslanajmal\/mango-pests."},{"key":"ref88","unstructured":"Kaggle. Sport celebrity image classification; 2023. [cited 2023 Aug 23]. Available from: https:\/\/www.kaggle.com\/datasets\/yaswanthgali\/sport-celebrity-image-classification?rv=1."},{"key":"ref89","series-title":"2013 IEEE China Summit and International Conference on Signal and Information Processing; 2013 Jul 6\u201310","first-page":"422","article-title":"CASIA image tampering detection evaluation database","author":"Dong"},{"key":"ref90","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision Workshops","first-page":"71","article-title":"IMD2020: a large-scale annotated dataset tailored for detecting manipulated images","author":"Novozamsky","year":"2020 Mar 1\u20135"},{"key":"ref91","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"893","article-title":"Autosplice: a text-prompt manipulated image dataset for media forensics","author":"Jia","year":"2023 Jun 17\u201324"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s13735-017-0143-x","article-title":"Detection and visualization of misleading content on Twitter","volume":"7","author":"Boididou","year":"2018","journal-title":"Int J Multim Inform Retr"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"76937","DOI":"10.1109\/ACCESS.2019.2922145","article-title":"The video authentication and camera identification database: a new database for video forensics","volume":"7","author":"Hosler","year":"2019","journal-title":"IEEE Access"},{"key":"ref94","series-title":"Proceedings of the 8th International Conference on Pattern Recognition Applications and Methods; 2019 Feb 19\u201321","first-page":"648","article-title":"SOCRatES: a database of realistic data for source camera recognition on smartphones","author":"Galdi","year":"2019"},{"key":"ref95","unstructured":"ITU. Advanced video coding for generic audiovisual services; 2024. EB\/OL. [cited 2025 Aug 12]. Available from: https:\/\/www.itu.int\/rec\/T-REC-H.264\/."},{"key":"ref96","unstructured":"Online Mp4 Parser; 2024 [Online]. [cited 2024 Apr 11]. Available from: https:\/\/www.onlinemp4parser.com\/."},{"key":"ref97","unstructured":"A Java API to read, write and create MP4 files; 2024 [Online]. [cited 2024 Apr 11]. Available from: https:\/\/github.com\/sannies\/mp4parser."},{"key":"ref98","unstructured":"ExifTool by Phil Harvey; 2024 [Online]. [cited 2024 Apr 11]. Available from: https:\/\/exiftool.org\/."},{"key":"ref99","unstructured":"ffprobe Documentation; 2024. EB\/OL. [cited 2025 Aug 12]. Available from: https:\/\/www.ffmpeg.org\/ffprobe.html."},{"key":"ref100","unstructured":"Python AVI parser; 2024 [Online]. [cited 2024 Apr 11]. Available from: https:\/\/github.com\/aurelpjetri\/python_avi_parser."},{"key":"ref101","unstructured":"Elcard StreamEye; 2024 [Online]. [cited 2024 Apr 11]. Available from: https:\/\/www.elcard.com\/."},{"key":"ref102","unstructured":"Gpac nightly builds\u2014gpac; 2024 [Online]. [cited 2024 Apr 11]. Available from: https:\/\/gpac.wp.imt.fr\/downloads\/gpac-nightly-builds\/."},{"key":"ref103","unstructured":"GitHub-aizvorski\/h264bitstream; 2024 [Online]. [cited 2024 Apr 11]. Available from: https:\/\/github.com\/aizvorski\/h264bitstream."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_69129\/TSP_CMC_69129.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:34Z","timestamp":1764826534000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63850"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":103,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.069129","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}